CVE-2023-53331 (GCVE-0-2023-53331)
Vulnerability from cvelistv5
Published
2025-09-16 16:12
Modified
2025-09-16 16:12
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
pstore/ram: Check start of empty przs during init
After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as
valid"), initialization would assume a prz was valid after seeing that
the buffer_size is zero (regardless of the buffer start position). This
unchecked start value means it could be outside the bounds of the buffer,
leading to future access panics when written to:
sysdump_panic_event+0x3b4/0x5b8
atomic_notifier_call_chain+0x54/0x90
panic+0x1c8/0x42c
die+0x29c/0x2a8
die_kernel_fault+0x68/0x78
__do_kernel_fault+0x1c4/0x1e0
do_bad_area+0x40/0x100
do_translation_fault+0x68/0x80
do_mem_abort+0x68/0xf8
el1_da+0x1c/0xc0
__raw_writeb+0x38/0x174
__memcpy_toio+0x40/0xac
persistent_ram_update+0x44/0x12c
persistent_ram_write+0x1a8/0x1b8
ramoops_pstore_write+0x198/0x1e8
pstore_console_write+0x94/0xe0
...
To avoid this, also check if the prz start is 0 during the initialization
phase. If not, the next prz sanity check case will discover it (start >
size) and zap the buffer back to a sane state.
[kees: update commit log with backtrace and clarifications]
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: e1e3a46706bd4037e8b7407dc660ae6e05b8ac56 Version: 265242d82a3c6a8bd9120d06b4801f8d7ae9a346 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: 30696378f68a9e3dad6bfe55938b112e72af00c2 Version: ec7f99261da9a20d63cbd273511a11a2efe698f2 Version: f250e4c562a3bd106575032666e9ef46f31231f8 Version: fffdbf586866e9500b53c9d4b061d3983720375a Version: 9e969ba431b46b1891c88cea36f722f3bfe8a180 |
||||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "fs/pstore/ram_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "89312657337e6e03ad6e9ea1a462bd9c158c85c8", "status": "affected", "version": "e1e3a46706bd4037e8b7407dc660ae6e05b8ac56", "versionType": "git" }, { "lessThan": "c807ccdd812d18985860504b503899f3140a9549", "status": "affected", "version": "265242d82a3c6a8bd9120d06b4801f8d7ae9a346", "versionType": "git" }, { "lessThan": "e972231db29b5d1dccc13bf9d5ba55b6979a69ed", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "lessThan": "dc2f60de9a7d3efd982440117dab5579898d808c", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "lessThan": "fedecaeef88899d940b69368c996e8b3b0b8650d", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "lessThan": "e95d7a8a6edd14f8fab44c777dd7281db91f6ae2", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "lessThan": "f77990358628b01bdc03752126ff5f716ea37615", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "lessThan": "25fb4e3402d46f425ec135ef6f09792a4c1b3003", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "lessThan": "fe8c3623ab06603eb760444a032d426542212021", "status": "affected", "version": "30696378f68a9e3dad6bfe55938b112e72af00c2", "versionType": "git" }, { "status": "affected", "version": "ec7f99261da9a20d63cbd273511a11a2efe698f2", "versionType": "git" }, { "status": "affected", "version": "f250e4c562a3bd106575032666e9ef46f31231f8", "versionType": "git" }, { "status": "affected", "version": "fffdbf586866e9500b53c9d4b061d3983720375a", "versionType": "git" }, { "status": "affected", "version": "9e969ba431b46b1891c88cea36f722f3bfe8a180", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "fs/pstore/ram_core.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.0" }, { "lessThan": "5.0", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "4.14.*", "status": "unaffected", "version": "4.14.326", "versionType": "semver" }, { "lessThanOrEqual": "4.19.*", "status": "unaffected", "version": "4.19.295", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.257", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.195", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.132", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.53", "versionType": "semver" }, { "lessThanOrEqual": "6.4.*", "status": "unaffected", "version": "6.4.16", "versionType": "semver" }, { "lessThanOrEqual": "6.5.*", "status": "unaffected", "version": "6.5.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.6", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.14.326", "versionStartIncluding": "4.14.96", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.19.295", "versionStartIncluding": "4.19.18", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.4.257", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.195", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.132", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.53", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.4.16", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.5.3", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.18.133", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.4.172", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.9.153", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.20.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Check start of empty przs during init\n\nAfter commit 30696378f68a (\"pstore/ram: Do not treat empty buffers as\nvalid\"), initialization would assume a prz was valid after seeing that\nthe buffer_size is zero (regardless of the buffer start position). This\nunchecked start value means it could be outside the bounds of the buffer,\nleading to future access panics when written to:\n\n sysdump_panic_event+0x3b4/0x5b8\n atomic_notifier_call_chain+0x54/0x90\n panic+0x1c8/0x42c\n die+0x29c/0x2a8\n die_kernel_fault+0x68/0x78\n __do_kernel_fault+0x1c4/0x1e0\n do_bad_area+0x40/0x100\n do_translation_fault+0x68/0x80\n do_mem_abort+0x68/0xf8\n el1_da+0x1c/0xc0\n __raw_writeb+0x38/0x174\n __memcpy_toio+0x40/0xac\n persistent_ram_update+0x44/0x12c\n persistent_ram_write+0x1a8/0x1b8\n ramoops_pstore_write+0x198/0x1e8\n pstore_console_write+0x94/0xe0\n ...\n\nTo avoid this, also check if the prz start is 0 during the initialization\nphase. If not, the next prz sanity check case will discover it (start \u003e\nsize) and zap the buffer back to a sane state.\n\n[kees: update commit log with backtrace and clarifications]" } ], "providerMetadata": { "dateUpdated": "2025-09-16T16:12:06.788Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/89312657337e6e03ad6e9ea1a462bd9c158c85c8" }, { "url": "https://git.kernel.org/stable/c/c807ccdd812d18985860504b503899f3140a9549" }, { "url": "https://git.kernel.org/stable/c/e972231db29b5d1dccc13bf9d5ba55b6979a69ed" }, { "url": "https://git.kernel.org/stable/c/dc2f60de9a7d3efd982440117dab5579898d808c" }, { "url": "https://git.kernel.org/stable/c/fedecaeef88899d940b69368c996e8b3b0b8650d" }, { "url": "https://git.kernel.org/stable/c/e95d7a8a6edd14f8fab44c777dd7281db91f6ae2" }, { "url": "https://git.kernel.org/stable/c/f77990358628b01bdc03752126ff5f716ea37615" }, { "url": "https://git.kernel.org/stable/c/25fb4e3402d46f425ec135ef6f09792a4c1b3003" }, { "url": "https://git.kernel.org/stable/c/fe8c3623ab06603eb760444a032d426542212021" } ], "title": "pstore/ram: Check start of empty przs during init", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53331", "datePublished": "2025-09-16T16:12:06.788Z", "dateReserved": "2025-09-16T16:08:59.564Z", "dateUpdated": "2025-09-16T16:12:06.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53331\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-16T17:15:39.597\",\"lastModified\":\"2025-09-17T14:18:55.093\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\npstore/ram: Check start of empty przs during init\\n\\nAfter commit 30696378f68a (\\\"pstore/ram: Do not treat empty buffers as\\nvalid\\\"), initialization would assume a prz was valid after seeing that\\nthe buffer_size is zero (regardless of the buffer start position). This\\nunchecked start value means it could be outside the bounds of the buffer,\\nleading to future access panics when written to:\\n\\n sysdump_panic_event+0x3b4/0x5b8\\n atomic_notifier_call_chain+0x54/0x90\\n panic+0x1c8/0x42c\\n die+0x29c/0x2a8\\n die_kernel_fault+0x68/0x78\\n __do_kernel_fault+0x1c4/0x1e0\\n do_bad_area+0x40/0x100\\n do_translation_fault+0x68/0x80\\n do_mem_abort+0x68/0xf8\\n el1_da+0x1c/0xc0\\n __raw_writeb+0x38/0x174\\n __memcpy_toio+0x40/0xac\\n persistent_ram_update+0x44/0x12c\\n persistent_ram_write+0x1a8/0x1b8\\n ramoops_pstore_write+0x198/0x1e8\\n pstore_console_write+0x94/0xe0\\n ...\\n\\nTo avoid this, also check if the prz start is 0 during the initialization\\nphase. If not, the next prz sanity check case will discover it (start \u003e\\nsize) and zap the buffer back to a sane state.\\n\\n[kees: update commit log with backtrace and clarifications]\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/25fb4e3402d46f425ec135ef6f09792a4c1b3003\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/89312657337e6e03ad6e9ea1a462bd9c158c85c8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c807ccdd812d18985860504b503899f3140a9549\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc2f60de9a7d3efd982440117dab5579898d808c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e95d7a8a6edd14f8fab44c777dd7281db91f6ae2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e972231db29b5d1dccc13bf9d5ba55b6979a69ed\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f77990358628b01bdc03752126ff5f716ea37615\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fe8c3623ab06603eb760444a032d426542212021\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fedecaeef88899d940b69368c996e8b3b0b8650d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…