CVE-2023-53270
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 2.6.27 (inc) to 5.15.111 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.28 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.15 (exc) |
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ext4 filesystem involves a discrepancy where the internal variable i_disksize can become larger than i_size during certain write operations. This mismatch can trigger warnings and potentially lead to unexpected behavior or kernel warnings (WARN_ON_ONCE) during direct I/O writes. The issue arises because the i_disksize is updated before the actual number of bytes copied is finalized, causing the inconsistency. The fix involves updating the copied value correctly before updating i_disksize to prevent this condition.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to stability and reliability of the ext4 filesystem during write operations. It can cause kernel warnings and potentially lead to unexpected behavior or crashes in the filesystem code when i_disksize exceeds i_size. This could affect system stability or data integrity during certain write scenarios, especially with direct I/O. However, no direct security impact such as privilege escalation or data leakage is described.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in the Linux kernel by updating the 'copied' value before updating i_disksize, preventing i_disksize from exceeding i_size and triggering warnings. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix (e.g., version 6.3.0-rc2 or later where the patch is applied).