CVE-2023-53763
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's f2fs filesystem related to an incorrect sanity check on the extent cache. Specifically, an out-of-bounds array index error occurs, which was caused by applying two versions of a patch incorrectly. The fix involved reverting the first version of the patch and applying the second, correct version to prevent the array index from going out of range.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to access memory out of bounds when handling the f2fs filesystem, potentially leading to system crashes or instability. This could affect system reliability and data integrity when using the f2fs filesystem.