CVE-2023-53555
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 6.3 (inc) to 6.4.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the damon_filter object's list field not being initialized properly in the function damos_new_filter(). Because the DAMON sysfs interface and DAMON_RECLAIM do not initialize this field after calling damos_new_filter(), it can lead to accessing uninitialized memory. This improper initialization can cause issues such as NULL pointer dereferencing when adding multiple DAMOS filters via the DAMON sysfs interface.
How can this vulnerability impact me? :
The vulnerability can lead to system instability or crashes due to NULL pointer dereferencing when multiple DAMOS filters are added via the DAMON sysfs interface. Accessing uninitialized memory can cause unpredictable behavior, potentially affecting system reliability and security.