CVE-2023-53569
Published: October 7, 2025Last modified: October 7, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow leading to undefined behavior.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.8 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Not affected (6.1.33-r0) |
| 25 LTS | linux-lts | Not affected (6.6.89-r0) | |
| Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/0ebfaf14150f55550cffb1148ed3920143c7a69c
- https://git.kernel.org/stable/c/22ab5fed07ad4b206ea910fd0132d1a0d4831584
- https://git.kernel.org/stable/c/451b98155be5dfee05bc6e7c8b30c0be4add3f71
- https://git.kernel.org/stable/c/62aeb94433fcec80241754b70d0d1836d5926b0a
- https://git.kernel.org/stable/c/99f8a15af6c9f0653193104a9e70891f950c6001
- https://git.kernel.org/stable/c/c2e7776843a953fd7e48895c3880c277f996193e
- https://git.kernel.org/stable/c/c4813f858e5c3e4c4659ce95385c1c400c593e1e
- https://git.kernel.org/stable/c/e6f4fb28890c1361e0db9eb1adee3fc04e7fe7f5