CVE-2023-53832
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's md/raid10 module. It occurs during the synchronization process of RAID 10 arrays when recovery is skipped but the initialization function init_resync() is still called without the corresponding close_sync() cleanup. This leads to a situation where a pointer (r10bio->dev[i].repl_bio) is not properly allocated, causing a null pointer dereference and potentially crashing the system or causing unexpected behavior.
How can this vulnerability impact me? :
The impact of this vulnerability is that it can cause a null pointer dereference in the Linux kernel RAID 10 synchronization process, which may lead to system crashes or instability. This can affect system availability and reliability, especially on systems using RAID 10 arrays for data redundancy and performance.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the null pointer dereference in md/raid10 sync_request. The fix prevents calling init_resync() if recovery is skipped, avoiding the null pointer dereference. Until the update is applied, avoid operations that trigger recovery skipping and device replacement in RAID10 arrays to reduce the risk of triggering the issue.