CVE-2023-53480

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53480
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53480.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53480
Downstream
Related
Published
2025-10-01T11:42:48.919Z
Modified
2025-11-28T02:35:12.912516Z
Summary
kobject: Add sanity check for kset->kobj.ktype in kset_register()
Details

In the Linux kernel, the following vulnerability has been resolved:

kobject: Add sanity check for kset->kobj.ktype in kset_register()

When I register a kset in the following way: static struct kset mykset; kobjectsetname(&mykset.kobj, "mykset"); ret = ksetregister(&my_kset);

A null pointer dereference exception is occurred: [ 4453.568337] Unable to handle kernel NULL pointer dereference at \ virtual address 0000000000000028 ... ... [ 4453.810361] Call trace: [ 4453.813062] kobjectgetownership+0xc/0x34 [ 4453.817493] kobjectaddinternal+0x98/0x274 [ 4453.822005] ksetregister+0x5c/0xb4 [ 4453.825820] mykobjinit+0x44/0x1000 [mykset] ... ...

Because I didn't initialize my_kset.kobj.ktype.

According to the description in Documentation/core-api/kobject.rst: - A ktype is the type of object that embeds a kobject. Every structure that embeds a kobject needs a corresponding ktype.

So add sanity check to make sure kset->kobj.ktype is not NULL.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53480.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
1792eac72e27f676bf9ebde28a5afea627fb85f0
Fixed
039ec9db2d30032eafa365f5f89b30eca5322b05
Fixed
964e025ceefdf75da46b0133d0c2790de451aeec
Fixed
5df5829158513134ddcaf2184d9286eda7b0bb18
Fixed
f3f6bf22a4f5ba649cf26ae4670de5c7f861bdef
Fixed
48aebbe801e78a8932404c122ed0e880ccedc220
Fixed
1a772881bc059c596d8ca587cbd2a233edce3d3b
Fixed
4d0fe8c52bb3029d83e323c961221156ab98680b

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.326
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.295
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.257
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.197
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.133
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.55
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.5