CVE-2023-53440
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.17 (inc) to 4.14.313 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.281 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.241 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.178 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.107 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.24 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.11 (exc) |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's nilfs2 sysfs interface arises from improper timing in creating and deleting sysfs entries related to metadata files (cpfile, sufile, dat). The sysfs attributes are created before the metadata file inodes are loaded and deleted after their inodes are released, which can lead to null pointer dereferences, use-after-free errors, and lockdep warnings. Additionally, the creation of these sysfs entries occurs while holding a semaphore lock (ns_sem), causing false positive circular locking warnings. The fix involves adjusting when the sysfs interface is created and deleted to ensure it only exists during the lifetime of the metadata files, preventing these issues.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to null pointer dereferences and use-after-free errors in the kernel. It may also trigger lock dependency warnings (lockdep), which can complicate debugging and system maintenance. While the circular locking warnings are false positives, the underlying timing issues could potentially lead to kernel faults affecting system reliability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the nilfs2 sysfs interface lifetime issue has been fixed. This fix involves changes to the creation and deletion timing of sysfs entries related to nilfs2, preventing null pointer dereferences, use-after-free, and lockdep warnings. Applying the official kernel patch or upgrading to a kernel release that includes this fix is recommended.