vulnerability
Ubuntu: (CVE-2023-53250): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Sep 16, 2025 | Sep 19, 2025 | Dec 5, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 1373 Comm: modprobe Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:dmi_sysfs_entry_release ... Call Trace: <TASK> kobject_put dmi_sysfs_register_handle (drivers/firmware/dmi-sysfs.c:540) dmi_sysfs dmi_decode_table (drivers/firmware/dmi_scan.c:133) dmi_walk (drivers/firmware/dmi_scan.c:1115) dmi_sysfs_init (drivers/firmware/dmi-sysfs.c:149) dmi_sysfs do_one_initcall (init/main.c:1296) ... Kernel panic - not syncing: Fatal exception Kernel Offset: 0x4000000 from 0xffffffff81000000 ---[ end Kernel panic - not syncing: Fatal exception ]--- It is because previous patch added kobject_put() to release the memory which will call dmi_sysfs_entry_release() and list_del(). However, list_add_tail(entry->list) is called after the error block, so the list_head is uninitialized and cannot be deleted. Move error handling to after list_add_tail to fix this.
Solutions
References
- CVE-2023-53250
- https://attackerkb.com/topics/CVE-2023-53250
- CWE-476
- URL-https://git.kernel.org/linus/18e126e97c961f7a93823795c879d7c085fe5098
- URL-https://git.kernel.org/stable/c/18e126e97c961f7a93823795c879d7c085fe5098
- URL-https://git.kernel.org/stable/c/5d0492d1d934642bdfd2057acc1b56f4b57be465
- URL-https://git.kernel.org/stable/c/b4fe158259fb5fead52ff2b55841ec5c39492604
- URL-https://git.kernel.org/stable/c/e851996b32264e78a10863c2ac41a8689d7b9252
- URL-https://www.cve.org/CVERecord?id=CVE-2023-53250
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.