ghsa-9g3f-fgm8-4cgm
Vulnerability from github
Published
2025-09-18 15:30
Modified
2025-09-18 15:30
VLAI Severity ?
Details
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request
There are two check of 'mreplace' in raid10_sync_request(). In the first check, 'need_replace' will be set and 'mreplace' will be used later if no-Faulty 'mreplace' exists, In the second check, 'mreplace' will be set to NULL if it is Faulty, but 'need_replace' will not be changed accordingly. null-ptr-deref occurs if Faulty is set between two check.
Fix it by merging two checks into one. And replace 'need_replace' with 'mreplace' because their values are always the same.
{ "affected": [], "aliases": [ "CVE-2023-53380" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-18T14:15:40Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: fix null-ptr-deref of mreplace in raid10_sync_request\n\nThere are two check of \u0027mreplace\u0027 in raid10_sync_request(). In the first\ncheck, \u0027need_replace\u0027 will be set and \u0027mreplace\u0027 will be used later if\nno-Faulty \u0027mreplace\u0027 exists, In the second check, \u0027mreplace\u0027 will be\nset to NULL if it is Faulty, but \u0027need_replace\u0027 will not be changed\naccordingly. null-ptr-deref occurs if Faulty is set between two check.\n\nFix it by merging two checks into one. And replace \u0027need_replace\u0027 with\n\u0027mreplace\u0027 because their values are always the same.", "id": "GHSA-9g3f-fgm8-4cgm", "modified": "2025-09-18T15:30:34Z", "published": "2025-09-18T15:30:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53380" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/144c7fd008e0072b0b565f1157eec618de54ca8a" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/222cc459d59857ee28a5366dc225ab42b22f9272" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/2990e2ece18dd4cca71b3109c80517ad94adb065" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/34817a2441747b48e444cb0e05d84e14bc9443da" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/45fa023b3334a7ae6f6c4eb977295804222dfa28" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b5015b97adda6a24dd3e713c63e521ecbeff25c6" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f4368a462b1f9a8ecc2fdb09a28c3d4cad302a4f" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…