CVE-2023-53295
udf: Do not update file length for failed writes to inline files
Description
In the Linux kernel, the following vulnerability has been resolved: udf: Do not update file length for failed writes to inline files When write to inline file fails (or happens only partly), we still updated length of inline data as if the whole write succeeded. Fix the update of length of inline data to happen only if the write succeeds.
INFO
Published Date :
Sept. 16, 2025, 8:15 a.m.
Last Modified :
Sept. 16, 2025, 12:49 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Update the Linux kernel to the latest version.
- Verify file length updates after write operations.
- Test write operations with failures.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-53295.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-53295 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-53295
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-53295 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-53295 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 16, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: udf: Do not update file length for failed writes to inline files When write to inline file fails (or happens only partly), we still updated length of inline data as if the whole write succeeded. Fix the update of length of inline data to happen only if the write succeeds. Added Reference https://git.kernel.org/stable/c/256fe4162f8b5a1625b8603ca5f7ff79725bfb47 Added Reference https://git.kernel.org/stable/c/5621f7a8139053d0c3c47fb68ee9f602139eb40a Added Reference https://git.kernel.org/stable/c/5a6c373d761f55635e175fa2f407544bae8f583b Added Reference https://git.kernel.org/stable/c/6837910aeb2c9101fc036dcd1b1f32615c20ec1a Added Reference https://git.kernel.org/stable/c/6d18cedc1ef0caeb1567cab660079e48844ff6d6 Added Reference https://git.kernel.org/stable/c/7bd8d9e1cf5607ee14407f4060b9a1dbb3c42802 Added Reference https://git.kernel.org/stable/c/c5787d77a5c29fffd295d138bd118b334990a567 Added Reference https://git.kernel.org/stable/c/eb2133900cac2d2f78befd6be41666cf1a2315d9