CVE-2023-53846
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's f2fs filesystem, specifically in the truncate_dnode() function. It occurs when truncating an inode that references another inode, leading to out-of-boundary memory access due to improper sanity checks on node pages. This can cause memory corruption or crashes. The fix adds sanity checks to prevent such invalid references and logs errors for filesystem repair.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption or kernel crashes when truncating files on the f2fs filesystem. This may result in system instability, data loss, or potential exploitation by attackers to execute arbitrary code or escalate privileges.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the ERROR_INVALID_NODE_REFERENCE error recorded in the superblock of the f2fs filesystem. Running fsck (filesystem check) on the affected filesystem can detect and attempt to repair this issue. Specific commands include: 1) sudo fsck.f2fs /dev/<device> to check the filesystem for errors. 2) Monitoring kernel logs (e.g., dmesg) for KASAN slab-use-after-free errors related to f2fs_truncate_data_blocks_range or truncate_dnode functions.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version that contains the patch fixing this vulnerability, which adds sanity checks in truncate_dnode() to prevent out-of-boundary access. Until the update is applied, avoid operations that trigger truncation on f2fs filesystems if possible. Additionally, regularly run fsck on f2fs filesystems to detect and repair any errors caused by this issue.