CVE-2023-53481

Source
https://cve.org/CVERecord?id=CVE-2023-53481
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53481.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53481
Downstream
Published
2025-10-01T11:42:49.825Z
Modified
2026-04-11T12:46:47.526678Z
Summary
ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed
Details

In the Linux kernel, the following vulnerability has been resolved:

ubi: ubiwlput_peb: Fix infinite loop when wear-leveling work failed

Following process will trigger an infinite loop in ubiwlput_peb():

ubifs_bgt       ubi_bgt

ubifslebunmap ubilebunmap ubiebaunmapleb ubiwlputpeb wearlevelingworker e1 = rbentry(rbfirst(&ubi->used) e2 = getpebforwl(ubi) ubiioreadvidhdr // return err (flash fault) outerror: ubi->movefrom = ubi->moveto = NULL wlentrydestroy(ubi, e1) ubi->lookuptbl[e->pnum] = NULL retry: e = ubi->lookuptbl[pnum]; // return NULL if (e == ubi->move_from) { // NULL == NULL gets true goto retry; // infinite loop !!!

$ top PID USER PR NI VIRT RES SHR S %CPU %MEM COMMAND 7676 root 20 0 0 0 0 R 100.0 0.0 ubifsbgt00

Fix it by: 1) Letting ubiwlputpeb() returns directly if wearl leveling entry has been removed from 'ubi->lookuptbl'. 2) Using 'ubi->wllock' protecting wl entry deletion to preventing an use-after-free problem for wl entry in ubiwlput_peb().

Fetch a reproducer in [Link].

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53481.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
43f9b25a9cdd7b177f77f026b1461abd1abbd174
Fixed
b40d2fbf47af58377e898b5062077a47bb28a132
Fixed
f006f596fe851c3b6aae60b79f89f89f0e515d2f
Fixed
b5be23f6ae610bdb262160a1f294afee6d0e6a69
Fixed
8a18856e074479bd050b01e688c58defadce7ab0
Fixed
3afaaf6f5867dc4ad383808d4053f428ec7b867d
Fixed
cc4bc532acda66189bddc03b3fe1ad689d9a48a2
Fixed
5af1c643184a5d09ff5b3f334077a4d0a163c677
Fixed
4d57a7333e26040f2b583983e1970d9d460e56b0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53481.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.25
Fixed
4.14.308
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.276
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.100
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.18
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53481.json"