Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-53089 |
CWE-ID | CWE-835 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108493
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53089
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the ext4_xattr_inode_iget() function in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.14 - 4.14.310
CPE2.3https://git.kernel.org/stable/c/0f7bfd6f8164be32dbbdf36aa1e5d00485c53cd7
https://git.kernel.org/stable/c/1aec41c98cce61d19ce89650895e51b9f3cdef13
https://git.kernel.org/stable/c/2c96c52aeaa6fd9163cfacdd98778b4a0398ef18
https://git.kernel.org/stable/c/64b72f5e7574020dea62ab733d88a54d903c42a1
https://git.kernel.org/stable/c/73f7987fe1b82596f1a380e85cd0097ebaae7e01
https://git.kernel.org/stable/c/94fd091576b12540924f6316ebc0678e84cb2800
https://git.kernel.org/stable/c/a98160d8f3e6242ca9b7f443f26e7ef3a61ba684
https://git.kernel.org/stable/c/efddc7e106fdf8d1f62d45e79de78f63b7c04fba
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.311
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.