CVE-2023-53250
15.09.2025, 15:15
In the Linux kernel, the following vulnerability has been resolved: firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 1373 Comm: modprobe Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:dmi_sysfs_entry_release ... Call Trace: <TASK> kobject_put dmi_sysfs_register_handle (drivers/firmware/dmi-sysfs.c:540) dmi_sysfs dmi_decode_table (drivers/firmware/dmi_scan.c:133) dmi_walk (drivers/firmware/dmi_scan.c:1115) dmi_sysfs_init (drivers/firmware/dmi-sysfs.c:149) dmi_sysfs do_one_initcall (init/main.c:1296) ... Kernel panic - not syncing: Fatal exception Kernel Offset: 0x4000000 from 0xffffffff81000000 ---[ end Kernel panic - not syncing: Fatal exception ]--- It is because previous patch added kobject_put() to release the memory which will call dmi_sysfs_entry_release() and list_del(). However, list_add_tail(entry->list) is called after the error block, so the list_head is uninitialized and cannot be deleted. Move error handling to after list_add_tail to fix this.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.9.318 ≤ 𝑥 < 4.10 |
| linux | linux_kernel | 4.14.283 ≤ 𝑥 < 4.15 |
| linux | linux_kernel | 4.19.247 ≤ 𝑥 < 4.20 |
| linux | linux_kernel | 5.4.198 ≤ 𝑥 < 5.5 |
| linux | linux_kernel | 5.10.122 ≤ 𝑥 < 5.11 |
| linux | linux_kernel | 5.15.47 ≤ 𝑥 < 5.15.99 |
| linux | linux_kernel | 5.17.15 ≤ 𝑥 < 5.18 |
| linux | linux_kernel | 5.18.4 ≤ 𝑥 < 6.1.16 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration