CVE-2023-53584Reachable Assertion in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process There are two states for ubifs writing pages: 1. Dirty, Private 2. Not Dirty, Not Private The normal process cannot go to ubifs_releasepage() which means there exists pages being private but not dirty. Reproducer[1] shows that it could occur (which maybe related to [2]) with following process: PA PB PC lock(page)[PA] ubifs_write_end attach_page_private //

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel2.6.276.1.18+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d7750be5d3e18500b454714677463b500a0b8b0d8+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r29j-x5gx-p5gg: In the Linux kernel, the following vulnerability has been resolved: ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process There are2025-10-04
OSV
CVE-2023-53584: In the Linux kernel, the following vulnerability has been resolved: ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process There are t2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process2025-10-04
Debian
CVE-2023-53584: linux - In the Linux kernel, the following vulnerability has been resolved: ubifs: ubif...2023