CVE-2023-53695

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53695
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53695.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53695
Downstream
Published
2025-10-22T13:23:36.524Z
Modified
2025-11-28T02:34:37.528002Z
Summary
udf: Detect system inodes linked into directory hierarchy
Details

In the Linux kernel, the following vulnerability has been resolved:

udf: Detect system inodes linked into directory hierarchy

When UDF filesystem is corrupted, hidden system inodes can be linked into directory hierarchy which is an avenue for further serious corruption of the filesystem and kernel confusion as noticed by syzbot fuzzed images. Refuse to access system inodes linked into directory hierarchy and vice versa.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53695.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
1dc71eeb198a8daa17d0c995998a53b0b749a158
Fixed
d747b31e2925a2f384e7dd1901a2e5bc5f984ed8
Fixed
a44ec34b90440ada190924f5908b97026504fdcd
Fixed
37e74003d81e79457535cbbdfa1603431c03fac0
Fixed
1f328751b65c49c13a312d67a3bf27766b85baf7
Fixed
9e3b5ef7d02eaa6553e79b4af9bd99227280f245
Fixed
85a37983ec69cc9fcd188bc37c4de15ee326355a

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.278
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3