CVE-2023-53766NULL Pointer Dereference in Linux

Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref.

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.124.14.324+6
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2a88efca805bea93cea9187dfd00835aa7093bf1b+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-2989-gqx8-wgwx: In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a che2025-12-08
OSV
FS: JFS: Check for read-only mounted filesystem in txBegin2025-12-08
OSV
CVE-2023-53766: In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: FS: JFS: Check for read-only mounted filesystem in txBegin2025-12-08
Debian
CVE-2023-53766: linux - In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Ch...2023