CVE-2023-53569Integer Overflow or Wraparound in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow leading to undefined behavior.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel2.6.12.14.14.316+7
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac20ebfaf14150f55550cffb1148ed3920143c7a69c+8
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5576-c4r8-hvqj: In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored2025-10-04
OSV
CVE-2023-53569: In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored i2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: ext2: Check block size validity during mount2025-10-04
Debian
CVE-2023-53569: linux - In the Linux kernel, the following vulnerability has been resolved: ext2: Check...2023