CVE-2023-53856
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's overlay subsystem. When applying an overlay, if the function of_overlay_fdt_apply() fails due to an unresolved symbol, the changeset used for tracking the overlay state is not properly initialized. Later, when the system tries to clean up this partial state by calling of_overlay_remove(), it can cause a crash due to a NULL-pointer dereference. The issue arises because of the order in which initialization functions are called, and it is fixed by moving the initialization call earlier in the process.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when cleaning up a failed overlay application, leading to potential system instability or denial of service. This could disrupt normal operations on affected systems.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix has been applied. The fix involves moving the call to of_changeset_init() to an earlier point in the overlay application process to prevent crashes due to NULL-pointer dereferences. Applying the latest kernel patches or updates from your Linux distribution that address this issue is recommended.