CVE-2023-53224Missing Release of Memory after Effective Lifetime in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: Fix function prototype mismatch for ext4_feat_ktype With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function pointer prototype to make sure the call target is valid to help mitigate ROP attacks. If they are not identical, there is a failure at run time, which manifests as either a kernel panic or thread getting killed. ext4_feat_ktype was sett

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.164.19.274+5
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxb99fee58a20ab8e0557cce87b6f187e3259931422b69cdd9f9a7f596e3dd31f05f9852940d177924+7
debiandebian/linux< linux 6.1.15-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53224: In the Linux kernel, the following vulnerability has been resolved: ext4: Fix function prototype mismatch for ext4_feat_ktype With clang's kernel cont2025-09-15
GHSA
GHSA-9x2c-7hh8-w98c: In the Linux kernel, the following vulnerability has been resolved: ext4: Fix function prototype mismatch for ext4_feat_ktype With clang's kernel co2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: ext4: Fix function prototype mismatch for ext4_feat_ktype2025-09-15
Debian
CVE-2023-53224: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: Fix f...2023
CVE-2023-53224 — Linux vulnerability | cvebase