In the Linux kernel, the following vulnerability has been resolved:
ext2: Check block size validity during mount
Check that log of block size stored in the superblock has sensible
value. Otherwise the shift computing the block size can overflow leading
to undefined behavior.
References
Configurations
Configuration 1 (hide)
|
History
12 Feb 2026, 17:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0ebfaf14150f55550cffb1148ed3920143c7a69c - Patch | |
| References | () https://git.kernel.org/stable/c/22ab5fed07ad4b206ea910fd0132d1a0d4831584 - Patch | |
| References | () https://git.kernel.org/stable/c/451b98155be5dfee05bc6e7c8b30c0be4add3f71 - Patch | |
| References | () https://git.kernel.org/stable/c/62aeb94433fcec80241754b70d0d1836d5926b0a - Patch | |
| References | () https://git.kernel.org/stable/c/99f8a15af6c9f0653193104a9e70891f950c6001 - Patch | |
| References | () https://git.kernel.org/stable/c/c2e7776843a953fd7e48895c3880c277f996193e - Patch | |
| References | () https://git.kernel.org/stable/c/c4813f858e5c3e4c4659ce95385c1c400c593e1e - Patch | |
| References | () https://git.kernel.org/stable/c/e6f4fb28890c1361e0db9eb1adee3fc04e7fe7f5 - Patch | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-12 17:10
NVD link : CVE-2023-53569
Mitre link : CVE-2023-53569
CVE.ORG link : CVE-2023-53569
JSON object : View
Products Affected
linux
- linux_kernel
CWE
