CVE-2023-53569 — Integer Overflow or Wraparound in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 4
Description
In the Linux kernel, the following vulnerability has been resolved:
ext2: Check block size validity during mount
Check that log of block size stored in the superblock has sensible
value. Otherwise the shift computing the block size can overflow leading
to undefined behavior.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages4 packages
▶CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 — 0ebfaf14150f55550cffb1148ed3920143c7a69c+8
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-5576-c4r8-hvqj: In the Linux kernel, the following vulnerability has been resolved:
ext2: Check block size validity during mount
Check that log of block size stored↗2025-10-04
OSV▶
CVE-2023-53569: In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored i↗2025-10-04