CVE-2023-53564
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.15 (inc) to 4.19.276 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.235 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.173 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.99 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
| linux | linux_kernel | From 3.0 (inc) to 4.14.308 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's ocfs2 filesystem related to defragmentation. Specifically, during the defragmentation process, a function called ocfs2_split_extent improperly calls jbd2_journal_restart, which leads to an assertion failure in the journaling layer (jbd2). The root cause is that the caller function __ocfs2_move_extent incorrectly calls journal access/dirty operations that ocfs2_split_extent already handles internally. This results in a crash due to a failed assertion in the journaling code.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when performing defragmentation operations on the ocfs2 filesystem. The crash is due to an assertion failure in the journaling subsystem, which can lead to system instability or downtime during filesystem defragmentation.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed by removing the journal access/dirty calls from __ocfs2_move_extent() and ensuring ocfs2_split_extent() handles journal operations correctly by itself. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix. There are no specific immediate commands or workarounds provided.