CVE-2023-53569

In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow leading to undefined behavior.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

History

12 Feb 2026, 17:10

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0ebfaf14150f55550cffb1148ed3920143c7a69c - () https://git.kernel.org/stable/c/0ebfaf14150f55550cffb1148ed3920143c7a69c - Patch
References () https://git.kernel.org/stable/c/22ab5fed07ad4b206ea910fd0132d1a0d4831584 - () https://git.kernel.org/stable/c/22ab5fed07ad4b206ea910fd0132d1a0d4831584 - Patch
References () https://git.kernel.org/stable/c/451b98155be5dfee05bc6e7c8b30c0be4add3f71 - () https://git.kernel.org/stable/c/451b98155be5dfee05bc6e7c8b30c0be4add3f71 - Patch
References () https://git.kernel.org/stable/c/62aeb94433fcec80241754b70d0d1836d5926b0a - () https://git.kernel.org/stable/c/62aeb94433fcec80241754b70d0d1836d5926b0a - Patch
References () https://git.kernel.org/stable/c/99f8a15af6c9f0653193104a9e70891f950c6001 - () https://git.kernel.org/stable/c/99f8a15af6c9f0653193104a9e70891f950c6001 - Patch
References () https://git.kernel.org/stable/c/c2e7776843a953fd7e48895c3880c277f996193e - () https://git.kernel.org/stable/c/c2e7776843a953fd7e48895c3880c277f996193e - Patch
References () https://git.kernel.org/stable/c/c4813f858e5c3e4c4659ce95385c1c400c593e1e - () https://git.kernel.org/stable/c/c4813f858e5c3e4c4659ce95385c1c400c593e1e - Patch
References () https://git.kernel.org/stable/c/e6f4fb28890c1361e0db9eb1adee3fc04e7fe7f5 - () https://git.kernel.org/stable/c/e6f4fb28890c1361e0db9eb1adee3fc04e7fe7f5 - Patch
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-02-12 17:10


NVD link : CVE-2023-53569

Mitre link : CVE-2023-53569

CVE.ORG link : CVE-2023-53569


JSON object : View

Products Affected

linux

  • linux_kernel