CVE-2023-53584
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.2 (inc) to 6.2.5 (exc) |
| linux | linux_kernel | From 2.6.27 (inc) to 6.1.18 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's UBIFS file system where an invalid state can arise involving pages that are marked as private but not dirty. Normally, pages should not be in this state when the ubifs_releasepage() function is called. However, due to a race condition between different processes handling page locking, writing, truncation, and cache invalidation, the system can hit an assertion failure (ubifs_assert(0)) in ubifs_releasepage(). This causes the UBIFS file system to switch to read-only mode and results in an error, potentially disrupting normal file system operations.
How can this vulnerability impact me? :
The impact of this vulnerability is that it can cause the UBIFS file system to hit an assertion failure and switch to read-only mode. This means that the affected system may lose the ability to write to the file system, potentially causing application errors, data write failures, or system instability until the issue is resolved or the system is rebooted.