In the Linux kernel, the following vulnerability has been resolved:
fs: prevent out-of-bounds array speculation when closing a file descriptor
Google-Bug-Id: 114199369
References
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CWE | CWE-125 | |
| References | () https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69 - Patch | |
| References | () https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4 - Patch | |
| References | () https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf - Patch | |
| References | () https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830 - Patch | |
| References | () https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06 - Patch | |
| References | () https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a - Patch | |
| References | () https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b - Patch | |
| References | () https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315 - Patch |
05 May 2025, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-02 16:15
Updated : 2025-11-10 17:51
NVD link : CVE-2023-53117
Mitre link : CVE-2023-53117
CVE.ORG link : CVE-2023-53117
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
