CVE-2023-53862
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's HFS filesystem code where a reference count (refcnt) for a node is not properly incremented after the node is found. Specifically, after a node is created with a reference count of 1, the code fails to call hfs_bnode_get() to increase the reference count when the node is found again. As a result, when hfs_bnode_put() is called to decrease the reference count, it triggers a kernel BUG because the reference count reaches zero unexpectedly. This bug can cause kernel crashes due to invalid operations on the node's reference count.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable when using the HFS filesystem, leading to potential denial of service. Since it triggers a kernel BUG due to improper reference counting, it may cause system crashes or unexpected behavior during filesystem operations, impacting system reliability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel BUG related to the hfs_bnode_put() function in the Linux kernel, specifically triggering BUG_ON() due to a reference count reaching zero unexpectedly. Detection involves monitoring kernel logs for BUG messages referencing fs/hfs/bnode.c at line 466 or related stack traces. You can check kernel logs using commands like: dmesg | grep 'hfs_bnode_put' or journalctl -k | grep 'hfs_bnode_put'. Additionally, monitoring for kernel BUG messages or invalid opcode errors in the logs can help identify the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by adding the missing hfs_bnode_get() call in the kernel source. Until an update is applied, avoid using the HFS filesystem features that trigger this bug or unmount any HFS filesystems to prevent triggering the kernel BUG. Monitoring and restricting workloads that use HFS filesystems can also reduce risk.