CVE-2023-53538
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.7.1 (inc) to 6.4.4 (exc) |
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 3.7 |
| linux | linux_kernel | 3.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a rare race condition in the Linux kernel's Btrfs filesystem, specifically in the tree modification log rewind process. It can cause a kernel panic due to a NULL pointer dereference when certain sequences of tree modification operations occur concurrently. This leads to a crash of the kernel, as shown by the detailed kernel panic trace in the description.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to panic and crash, leading to system instability and potential data loss or downtime. Since it affects the Btrfs filesystem, any system using Btrfs could experience unexpected crashes under specific conditions, impacting availability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for kernel panic messages related to BTRFS, specifically messages like 'BTRFS critical (device sda3): unable to find logical 0 length 4096' and kernel NULL pointer dereference errors. Checking dmesg or journalctl logs for such traces can help identify if the issue has occurred. Example commands include: 'dmesg | grep -i btrfs' or 'journalctl -k | grep -i btrfs'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this BTRFS vulnerability has been resolved. Avoid using affected kernel versions and apply vendor-provided patches or kernel updates that address this race condition in the BTRFS tree mod log rewind functionality.