CVE-2023-53847
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | alauda | * |
| linux | usb-storage | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's usb-storage alauda subdriver. It occurs because the function alauda_check_media() does not verify whether a USB transfer succeeded before using the received data, leading to access of uninitialized memory. This can cause undefined behavior or system instability. Additionally, there is a redundant debug call in alauda_get_media_status() when errors occur, and the code improperly performs DMA to a stack buffer instead of a proper DMA-able buffer. The fix involves checking transfer success before using data and using a proper DMA buffer.
How can this vulnerability impact me? :
The impact of this vulnerability could include system instability or crashes due to the use of uninitialized memory in the USB storage driver. It may also lead to unpredictable behavior when accessing USB storage devices using the alauda subdriver. However, the exact consequences are not fully detailed, but a conservative approach is to treat failed transfers as if no media is present, preventing further issues.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by fixing the uninitialized value access in the alauda subdriver of usb-storage in the Linux kernel. Immediate mitigation involves updating your Linux kernel to a version that includes this fix. Since the issue is related to the usb-storage alauda driver, avoiding use of affected versions or applying the patch provided by the kernel maintainers is recommended.