Bug 2401521 (CVE-2023-53569)
| Summary: | CVE-2023-53569 kernel: ext2: Check block size validity during mount | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
An integer overflow vulnerability was found in the Linux kernel ext2 filesystem's block size validation during mount. A local user with privileges to mount filesystems can mount a crafted ext2 image with an excessively large log_block_size value in the superblock, causing the shift operation computing the actual block size to overflow and trigger undefined behavior, which results in denial of service through kernel crash or unpredictable system behavior.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2025-10-04 16:05:18 UTC
|