Out-of-bounds read in Linux kernel squashfs



| Updated: 2025-05-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-52979
CWE-ID CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds read

EUVDB-ID: #VU106180

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52979

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the squashfs_read_xattr_id_table() function in fs/squashfs/xattr_id.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.10 - 5.10.167

CPE2.3 External links

https://git.kernel.org/stable/c/29e774dcb27116c06b9c57b1f1f14a1623738989
https://git.kernel.org/stable/c/72e544b1b28325fe78a4687b980871a7e4101f76
https://git.kernel.org/stable/c/b30a74f83265c24d1d0842c6c3928cd2e775a3fb
https://git.kernel.org/stable/c/b7398efe24a965cf3937b716c0b1011c201c5d6e
https://git.kernel.org/stable/c/cf5d6612092408157db6bb500c70bf6d67c40fbc
https://git.kernel.org/stable/c/db76fc535fbdfbf29fd0b93e49627537ad794c8c
https://git.kernel.org/stable/c/de2785aa3448d1ee7be3ab47fd4a873025f1b3d7
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.168


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###