CVE-2023-53763Operator Precedence Logic Error in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: fix to do sanity check on extent cache correctly" syzbot reports a f2fs bug as below: UBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19 index 1409 is out of range for type '__le32[923]' (aka 'unsigned int[923]') Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c

Affected Packages4 packages

Linuxlinux/linux_kernel6.2.06.4.16+2
Debianlinux/linux_kernel< 6.1.55-1+2
CVEListV5linux/linux85eb8b61dd4cfc7a839a0e86287b92ca6193444e0d545a8e77cbd1fbad311b18952e38e0f7672ab4+5
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
Revert "f2fs: fix to do sanity check on extent cache correctly"2025-12-08
GHSA
GHSA-5fw5-8689-q6mq: In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: fix to do sanity check on extent cache correctly" syzbot reports a2025-12-08
OSV
CVE-2023-53763: In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: fix to do sanity check on extent cache correctly" syzbot reports a f2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: Revert "f2fs: fix to do sanity check on extent cache correctly"2025-12-08
Debian
CVE-2023-53763: linux - In the Linux kernel, the following vulnerability has been resolved: Revert "f2f...2023