CVE-2023-53331

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
16/09/2025
Last modified:
10/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pstore/ram: Check start of empty przs during init<br /> <br /> After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as<br /> valid"), initialization would assume a prz was valid after seeing that<br /> the buffer_size is zero (regardless of the buffer start position). This<br /> unchecked start value means it could be outside the bounds of the buffer,<br /> leading to future access panics when written to:<br /> <br /> sysdump_panic_event+0x3b4/0x5b8<br /> atomic_notifier_call_chain+0x54/0x90<br /> panic+0x1c8/0x42c<br /> die+0x29c/0x2a8<br /> die_kernel_fault+0x68/0x78<br /> __do_kernel_fault+0x1c4/0x1e0<br /> do_bad_area+0x40/0x100<br /> do_translation_fault+0x68/0x80<br /> do_mem_abort+0x68/0xf8<br /> el1_da+0x1c/0xc0<br /> __raw_writeb+0x38/0x174<br /> __memcpy_toio+0x40/0xac<br /> persistent_ram_update+0x44/0x12c<br /> persistent_ram_write+0x1a8/0x1b8<br /> ramoops_pstore_write+0x198/0x1e8<br /> pstore_console_write+0x94/0xe0<br /> ...<br /> <br /> To avoid this, also check if the prz start is 0 during the initialization<br /> phase. If not, the next prz sanity check case will discover it (start &gt;<br /> size) and zap the buffer back to a sane state.<br /> <br /> [kees: update commit log with backtrace and clarifications]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.18.133 (including) 3.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.4.172 (including) 4.5 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.153 (including) 4.10 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14.96 (including) 4.14.326 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.18 (including) 4.19.295 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20.5 (including) 5.4.257 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.195 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.132 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.53 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.4.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.5 (including) 6.5.3 (excluding)