CVE-2023-53665
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.6 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's md (multiple device) subsystem occurs because the mddev object is dereferenced after the export_rdev() function, even though it may no longer be valid. Specifically, mddev->kobject is referenced by rdev->kobject, but if the last rdev is freed, mddev might have been freed as well, leading to a use-after-free scenario. This can cause a general protection fault or kernel crash when the invalid mddev is accessed. The issue can be triggered by rapidly adding and removing devices to mdadm arrays, as demonstrated by the provided test case. The fix involves ensuring mddev is not dereferenced after export_rdev().
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or experience a general protection fault, potentially leading to system instability or denial of service. If an attacker or a malfunctioning process triggers this bug by rapidly adding and removing devices from mdadm arrays, it could disrupt normal system operations, affecting availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the provided test for mdadm at a very low rate, which triggers the issue. The test involves repeatedly adding and removing devices via sysfs commands targeting /sys/block/md0/md/new_dev and /sys/block/md0/md/dev-<devname>/state. The specific test command is: ./test --save-logs --logdir=/tmp/ --keep-going --dev=loop --tests=23rdev-lifetime
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to apply the fix that avoids dereferencing mddev after export_rdev(), as the vulnerability arises from mddev being used after it may no longer be valid. This fix is implemented in the Linux kernel source to prevent the general protection fault.