CVE-2023-53165

Source
https://cve.org/CVERecord?id=CVE-2023-53165
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53165.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53165
Downstream
Related
Published
2025-09-15T14:03:53.987Z
Modified
2026-03-20T12:33:00.211020Z
Summary
udf: Fix uninitialized array access for some pathnames
Details

In the Linux kernel, the following vulnerability has been resolved:

udf: Fix uninitialized array access for some pathnames

For filenames that begin with . and are between 2 and 5 characters long, UDF charset conversion code would read uninitialized memory in the output buffer. The only practical impact is that the name may be prepended a "unification hash" when it is not actually needed but still it is good to fix this.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53165.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
484a10f49387e4386bf2708532e75bf78ffea2cb
Fixed
008ae78d1e12efa904dc819b1ec83e2bca6b2c56
Fixed
b37f998d357102e8eb0f8eeb33f03fff22e49cbf
Fixed
3f1368af47acf4d0b2a5fb0d2c0d6919d2234b6d
Fixed
4503f6fc95d6dee85fb2c54785848799e192c51c
Fixed
985f9666698960dfc87a106d6314203fa90fda75
Fixed
a6824149809395dfbb5bc36bc7057cc3cb84e56d
Fixed
4d50988da0db167aed6f38685145cb5cd526c4f8
Fixed
028f6055c912588e6f72722d89c30b401bbcf013

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53165.json"