First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: squashfs: harden sanity check in squashfs_read_xattr_id_table While mounting a corrupted filesystem, a signed integer '*xattr_ids' can become less than zero. This leads to the incorrect computation of 'len' and 'indexes' values which can cause null-ptr-deref in copy_bio_to_actor() or out-of-bounds accesses in the next sanity checks inside squashfs_read_xattr_id_table(). Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=4.4.258<4.5 | |
Linux Kernel | >=4.9.258<4.10 | |
Linux Kernel | >=4.14.222<4.14.306 | |
Linux Kernel | >=4.19.176<4.19.273 | |
Linux Kernel | >=5.4.98<5.4.232 | |
Linux Kernel | >=5.10.16<5.10.168 | |
Linux Kernel | >=5.11<5.15.93 | |
Linux Kernel | >=5.16<6.1.11 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Linux Kernel | =6.2-rc5 | |
Linux Kernel | =6.2-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52979 is considered a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2023-52979, you should upgrade to the latest version of the Linux kernel that includes the patch addressing this vulnerability.
CVE-2023-52979 affects systems running the Linux kernel, specifically those utilizing squashfs filesystems.
The impact of CVE-2023-52979 can lead to incorrect processing of extended attributes when handling corrupted squashfs files.
No, CVE-2023-52979 is not classified as a remote code execution vulnerability, but it can lead to potential data corruption.