CVE-2023-53481
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an infinite loop in the Linux kernel's UBI (Unsorted Block Images) wear-leveling function ubi_wl_put_peb(). It occurs when the wear-leveling work fails due to a flash fault during reading, causing the function to enter a retry loop indefinitely because a condition comparing NULL pointers always evaluates to true. This leads to 100% CPU usage by the affected process.
How can this vulnerability impact me? :
The vulnerability can cause the affected Linux system to hang or become unresponsive due to a process consuming 100% CPU in an infinite loop. This can degrade system performance, potentially leading to denial of service or disruption of normal operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for processes stuck in an infinite loop related to the wear-leveling worker in the UBI subsystem. For example, using the command 'top' to check for a process named 'ubifs_bgt0_0' consuming 100% CPU can indicate the issue. Specifically, running 'top' and looking for high CPU usage by 'ubifs_bgt' processes can help detect the problem.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the fix that prevents the infinite loop by ensuring ubi_wl_put_peb() returns directly if the wear-leveling entry has been removed from 'ubi->lookuptbl', and by using 'ubi->wl_lock' to protect wear-leveling entry deletion to prevent use-after-free issues. Practically, this means updating the Linux kernel to a version that includes this fix.