CVE-2023-53826
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Use-After-Free (UAF) issue in the Linux kernel's UBI (Unsorted Block Images) subsystem related to wear-leveling entries. Specifically, a wear-leveling entry could be freed in an error path but still accessed afterward in the eraseblk_count_seq_show() function, leading to potential invalid memory access. The problem arises because the updating and accessing of wear-leveling entries in the lookuptbl were not properly synchronized with a lock (ubi->wl_lock). The fix involved adding this lock to serialize access and prevent the use-after-free condition.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if they can trigger the flaw. It affects the reliability and security of systems running vulnerable Linux kernel versions with UBI wear-leveling enabled.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the use-after-free (UAF) vulnerability in the Linux kernel's ubi wear-leveling entry by ensuring that ubi->wl_lock is used to serialize access between wl_entry_destroy() and eraseblk_count_seq_show(). This prevents concurrent access issues. Updating your Linux kernel to a version that includes this fix is the recommended mitigation.