CVE-2023-53214
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15 (inc) to 5.15.100 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.18 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to a Linux kernel version that includes the fix for the f2fs __update_iostat_latency() memory corruption issue. This fix adds an iotype sanity check to prevent buffer overflow and memory corruption. Until then, avoid using vulnerable kernel versions.
Can you explain this vulnerability to me?
This vulnerability is a potential memory corruption issue in the Linux kernel's f2fs filesystem code, specifically in the __update_iostat_latency() function. It occurs due to a missing sanity check on the 'iotype' parameter, which can lead to a buffer overflow when updating latency statistics. The problem arises from a mixup between META_FLUSH and NR_PAGE_TYPE values, causing out-of-bounds access and memory corruption.