CVE-2023-53214

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
15/09/2025
Last modified:
14/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix to avoid potential memory corruption in __update_iostat_latency()<br /> <br /> Add iotype sanity check to avoid potential memory corruption.<br /> This is to fix the compile error below:<br /> <br /> fs/f2fs/iostat.c:231 __update_iostat_latency() error: buffer overflow<br /> &amp;#39;io_lat-&gt;peak_lat[type]&amp;#39; 3 type;<br /> 216 struct f2fs_sb_info *sbi = iostat_ctx-&gt;sbi;<br /> 217 struct iostat_lat_info *io_lat = sbi-&gt;iostat_io_lat;<br /> 218 unsigned long flags;<br /> 219<br /> 220 if (!sbi-&gt;iostat_enable)<br /> 221 return;<br /> 222<br /> 223 ts_diff = jiffies - iostat_ctx-&gt;submit_ts;<br /> 224 if (page_type &gt;= META_FLUSH)<br /> ^^^^^^^^^^<br /> <br /> 225 page_type = META;<br /> 226<br /> 227 spin_lock_irqsave(&amp;sbi-&gt;iostat_lat_lock, flags);<br /> @228 io_lat-&gt;sum_lat[type][page_type] += ts_diff;<br /> ^^^^^^^^^<br /> Mixup between META_FLUSH and NR_PAGE_TYPE leads to memory corruption.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15 (including) 5.15.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.2.5 (excluding)