CVE-2023-53569
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | From 4.20 (inc) to 5.4.244 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.284 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.4 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.30 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.113 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.181 (exc) |
| linux | linux_kernel | From 2.6.12.1 (inc) to 4.14.316 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ext2 filesystem involves improper validation of the block size during the mounting process. Specifically, the log of the block size stored in the superblock is not properly checked for sensible values. If this value is invalid, the calculation (shift) used to determine the block size can overflow, which may lead to undefined behavior in the system.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause undefined behavior in the Linux kernel when mounting ext2 filesystems. This might lead to system instability, crashes, or potential security risks depending on how the undefined behavior manifests, possibly affecting system reliability and data integrity.