CVE-2023-53777
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's EROFS filesystem when handling data-deduplicated compressed images. Specifically, two chains of pclusters can link to each other simultaneously, forming a loop. This loop prevents the entire chain from being submitted, causing the corresponding file pages to remain locked indefinitely. This issue arises under heavy stress with multi-threaded workloads on deduplicated compressed images, leading to locked file pages due to looped hooked chains.
How can this vulnerability impact me? :
The vulnerability can cause file pages to remain locked forever, which may lead to system resource exhaustion or degraded system performance. This happens because the looped chains prevent proper submission and release of file pages, potentially affecting system stability when using deduplicated compressed images under heavy multi-threaded workloads.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using data-deduplicated compressed images that trigger the hooked chains issue. Since the problem arises from hooked chains causing loops and locked file pages, disabling or avoiding the use of this optimization until a proper fix is available is recommended.