CVE-2023-53331 (GCVE-0-2023-53331)

Vulnerability from cvelistv5 – Published: 2025-09-16 16:12 – Updated: 2026-01-14 18:32
VLAI?
Title
pstore/ram: Check start of empty przs during init
Summary
In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Check start of empty przs during init After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as valid"), initialization would assume a prz was valid after seeing that the buffer_size is zero (regardless of the buffer start position). This unchecked start value means it could be outside the bounds of the buffer, leading to future access panics when written to: sysdump_panic_event+0x3b4/0x5b8 atomic_notifier_call_chain+0x54/0x90 panic+0x1c8/0x42c die+0x29c/0x2a8 die_kernel_fault+0x68/0x78 __do_kernel_fault+0x1c4/0x1e0 do_bad_area+0x40/0x100 do_translation_fault+0x68/0x80 do_mem_abort+0x68/0xf8 el1_da+0x1c/0xc0 __raw_writeb+0x38/0x174 __memcpy_toio+0x40/0xac persistent_ram_update+0x44/0x12c persistent_ram_write+0x1a8/0x1b8 ramoops_pstore_write+0x198/0x1e8 pstore_console_write+0x94/0xe0 ... To avoid this, also check if the prz start is 0 during the initialization phase. If not, the next prz sanity check case will discover it (start > size) and zap the buffer back to a sane state. [kees: update commit log with backtrace and clarifications]
CWE
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: e1e3a46706bd4037e8b7407dc660ae6e05b8ac56 , < 89312657337e6e03ad6e9ea1a462bd9c158c85c8 (git)
Affected: 265242d82a3c6a8bd9120d06b4801f8d7ae9a346 , < c807ccdd812d18985860504b503899f3140a9549 (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < e972231db29b5d1dccc13bf9d5ba55b6979a69ed (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < dc2f60de9a7d3efd982440117dab5579898d808c (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < fedecaeef88899d940b69368c996e8b3b0b8650d (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < e95d7a8a6edd14f8fab44c777dd7281db91f6ae2 (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < f77990358628b01bdc03752126ff5f716ea37615 (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < 25fb4e3402d46f425ec135ef6f09792a4c1b3003 (git)
Affected: 30696378f68a9e3dad6bfe55938b112e72af00c2 , < fe8c3623ab06603eb760444a032d426542212021 (git)
Affected: ec7f99261da9a20d63cbd273511a11a2efe698f2 (git)
Affected: f250e4c562a3bd106575032666e9ef46f31231f8 (git)
Affected: fffdbf586866e9500b53c9d4b061d3983720375a (git)
Affected: 9e969ba431b46b1891c88cea36f722f3bfe8a180 (git)
Create a notification for this product.
    Linux Linux Affected: 5.0
Unaffected: 0 , < 5.0 (semver)
Unaffected: 4.14.326 , ≤ 4.14.* (semver)
Unaffected: 4.19.295 , ≤ 4.19.* (semver)
Unaffected: 5.4.257 , ≤ 5.4.* (semver)
Unaffected: 5.10.195 , ≤ 5.10.* (semver)
Unaffected: 5.15.132 , ≤ 5.15.* (semver)
Unaffected: 6.1.53 , ≤ 6.1.* (semver)
Unaffected: 6.4.16 , ≤ 6.4.* (semver)
Unaffected: 6.5.3 , ≤ 6.5.* (semver)
Unaffected: 6.6 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-53331",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-14T18:30:13.040006Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-14T18:32:59.884Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/pstore/ram_core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "89312657337e6e03ad6e9ea1a462bd9c158c85c8",
              "status": "affected",
              "version": "e1e3a46706bd4037e8b7407dc660ae6e05b8ac56",
              "versionType": "git"
            },
            {
              "lessThan": "c807ccdd812d18985860504b503899f3140a9549",
              "status": "affected",
              "version": "265242d82a3c6a8bd9120d06b4801f8d7ae9a346",
              "versionType": "git"
            },
            {
              "lessThan": "e972231db29b5d1dccc13bf9d5ba55b6979a69ed",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "lessThan": "dc2f60de9a7d3efd982440117dab5579898d808c",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "lessThan": "fedecaeef88899d940b69368c996e8b3b0b8650d",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "lessThan": "e95d7a8a6edd14f8fab44c777dd7281db91f6ae2",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "lessThan": "f77990358628b01bdc03752126ff5f716ea37615",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "lessThan": "25fb4e3402d46f425ec135ef6f09792a4c1b3003",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "lessThan": "fe8c3623ab06603eb760444a032d426542212021",
              "status": "affected",
              "version": "30696378f68a9e3dad6bfe55938b112e72af00c2",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ec7f99261da9a20d63cbd273511a11a2efe698f2",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "f250e4c562a3bd106575032666e9ef46f31231f8",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "fffdbf586866e9500b53c9d4b061d3983720375a",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "9e969ba431b46b1891c88cea36f722f3bfe8a180",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/pstore/ram_core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.0"
            },
            {
              "lessThan": "5.0",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.326",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.295",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.257",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.195",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.132",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.53",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.*",
              "status": "unaffected",
              "version": "6.4.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.326",
                  "versionStartIncluding": "4.14.96",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.295",
                  "versionStartIncluding": "4.19.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.257",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.195",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.132",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.53",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.4.16",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5.3",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6",
                  "versionStartIncluding": "5.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.18.133",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.172",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.153",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.20.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Check start of empty przs during init\n\nAfter commit 30696378f68a (\"pstore/ram: Do not treat empty buffers as\nvalid\"), initialization would assume a prz was valid after seeing that\nthe buffer_size is zero (regardless of the buffer start position). This\nunchecked start value means it could be outside the bounds of the buffer,\nleading to future access panics when written to:\n\n sysdump_panic_event+0x3b4/0x5b8\n atomic_notifier_call_chain+0x54/0x90\n panic+0x1c8/0x42c\n die+0x29c/0x2a8\n die_kernel_fault+0x68/0x78\n __do_kernel_fault+0x1c4/0x1e0\n do_bad_area+0x40/0x100\n do_translation_fault+0x68/0x80\n do_mem_abort+0x68/0xf8\n el1_da+0x1c/0xc0\n __raw_writeb+0x38/0x174\n __memcpy_toio+0x40/0xac\n persistent_ram_update+0x44/0x12c\n persistent_ram_write+0x1a8/0x1b8\n ramoops_pstore_write+0x198/0x1e8\n pstore_console_write+0x94/0xe0\n ...\n\nTo avoid this, also check if the prz start is 0 during the initialization\nphase. If not, the next prz sanity check case will discover it (start \u003e\nsize) and zap the buffer back to a sane state.\n\n[kees: update commit log with backtrace and clarifications]"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-16T16:12:06.788Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/89312657337e6e03ad6e9ea1a462bd9c158c85c8"
        },
        {
          "url": "https://git.kernel.org/stable/c/c807ccdd812d18985860504b503899f3140a9549"
        },
        {
          "url": "https://git.kernel.org/stable/c/e972231db29b5d1dccc13bf9d5ba55b6979a69ed"
        },
        {
          "url": "https://git.kernel.org/stable/c/dc2f60de9a7d3efd982440117dab5579898d808c"
        },
        {
          "url": "https://git.kernel.org/stable/c/fedecaeef88899d940b69368c996e8b3b0b8650d"
        },
        {
          "url": "https://git.kernel.org/stable/c/e95d7a8a6edd14f8fab44c777dd7281db91f6ae2"
        },
        {
          "url": "https://git.kernel.org/stable/c/f77990358628b01bdc03752126ff5f716ea37615"
        },
        {
          "url": "https://git.kernel.org/stable/c/25fb4e3402d46f425ec135ef6f09792a4c1b3003"
        },
        {
          "url": "https://git.kernel.org/stable/c/fe8c3623ab06603eb760444a032d426542212021"
        }
      ],
      "title": "pstore/ram: Check start of empty przs during init",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53331",
    "datePublished": "2025-09-16T16:12:06.788Z",
    "dateReserved": "2025-09-16T16:08:59.564Z",
    "dateUpdated": "2026-01-14T18:32:59.884Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-53331\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-14T18:30:13.040006Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-14T18:30:07.671Z\"}}], \"cna\": {\"title\": \"pstore/ram: Check start of empty przs during init\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"e1e3a46706bd4037e8b7407dc660ae6e05b8ac56\", \"lessThan\": \"89312657337e6e03ad6e9ea1a462bd9c158c85c8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"265242d82a3c6a8bd9120d06b4801f8d7ae9a346\", \"lessThan\": \"c807ccdd812d18985860504b503899f3140a9549\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"e972231db29b5d1dccc13bf9d5ba55b6979a69ed\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"dc2f60de9a7d3efd982440117dab5579898d808c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"fedecaeef88899d940b69368c996e8b3b0b8650d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"e95d7a8a6edd14f8fab44c777dd7281db91f6ae2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"f77990358628b01bdc03752126ff5f716ea37615\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"25fb4e3402d46f425ec135ef6f09792a4c1b3003\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"30696378f68a9e3dad6bfe55938b112e72af00c2\", \"lessThan\": \"fe8c3623ab06603eb760444a032d426542212021\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ec7f99261da9a20d63cbd273511a11a2efe698f2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f250e4c562a3bd106575032666e9ef46f31231f8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fffdbf586866e9500b53c9d4b061d3983720375a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"9e969ba431b46b1891c88cea36f722f3bfe8a180\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/pstore/ram_core.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.0\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.326\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.295\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.257\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.195\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.132\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.53\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.4.16\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.4.*\"}, {\"status\": \"unaffected\", \"version\": \"6.5.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/pstore/ram_core.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/89312657337e6e03ad6e9ea1a462bd9c158c85c8\"}, {\"url\": \"https://git.kernel.org/stable/c/c807ccdd812d18985860504b503899f3140a9549\"}, {\"url\": \"https://git.kernel.org/stable/c/e972231db29b5d1dccc13bf9d5ba55b6979a69ed\"}, {\"url\": \"https://git.kernel.org/stable/c/dc2f60de9a7d3efd982440117dab5579898d808c\"}, {\"url\": \"https://git.kernel.org/stable/c/fedecaeef88899d940b69368c996e8b3b0b8650d\"}, {\"url\": \"https://git.kernel.org/stable/c/e95d7a8a6edd14f8fab44c777dd7281db91f6ae2\"}, {\"url\": \"https://git.kernel.org/stable/c/f77990358628b01bdc03752126ff5f716ea37615\"}, {\"url\": \"https://git.kernel.org/stable/c/25fb4e3402d46f425ec135ef6f09792a4c1b3003\"}, {\"url\": \"https://git.kernel.org/stable/c/fe8c3623ab06603eb760444a032d426542212021\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\npstore/ram: Check start of empty przs during init\\n\\nAfter commit 30696378f68a (\\\"pstore/ram: Do not treat empty buffers as\\nvalid\\\"), initialization would assume a prz was valid after seeing that\\nthe buffer_size is zero (regardless of the buffer start position). This\\nunchecked start value means it could be outside the bounds of the buffer,\\nleading to future access panics when written to:\\n\\n sysdump_panic_event+0x3b4/0x5b8\\n atomic_notifier_call_chain+0x54/0x90\\n panic+0x1c8/0x42c\\n die+0x29c/0x2a8\\n die_kernel_fault+0x68/0x78\\n __do_kernel_fault+0x1c4/0x1e0\\n do_bad_area+0x40/0x100\\n do_translation_fault+0x68/0x80\\n do_mem_abort+0x68/0xf8\\n el1_da+0x1c/0xc0\\n __raw_writeb+0x38/0x174\\n __memcpy_toio+0x40/0xac\\n persistent_ram_update+0x44/0x12c\\n persistent_ram_write+0x1a8/0x1b8\\n ramoops_pstore_write+0x198/0x1e8\\n pstore_console_write+0x94/0xe0\\n ...\\n\\nTo avoid this, also check if the prz start is 0 during the initialization\\nphase. If not, the next prz sanity check case will discover it (start \u003e\\nsize) and zap the buffer back to a sane state.\\n\\n[kees: update commit log with backtrace and clarifications]\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.326\", \"versionStartIncluding\": \"4.14.96\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.295\", \"versionStartIncluding\": \"4.19.18\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.257\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.195\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.132\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.53\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.4.16\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.5.3\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6\", \"versionStartIncluding\": \"5.0\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.18.133\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.4.172\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.9.153\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.20.5\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-09-16T16:12:06.788Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-53331\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T18:32:59.884Z\", \"dateReserved\": \"2025-09-16T16:08:59.564Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-09-16T16:12:06.788Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…