SB2025100473 - Use-after-free in Linux kernel f2fs
Published: October 4, 2025 Updated: October 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53537)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the f2fs_submit_merged_ipu_write() and f2fs_write_single_data_page() functions in fs/f2fs/data.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/5cdb422c839134273866208dad5360835ddb9794
- https://git.kernel.org/stable/c/7d058f0ab161437369ad6e45a4b67c2886e71373
- https://git.kernel.org/stable/c/97ec6f1788cc6bee3f8c89cb908e1a2a1cd859bb
- https://git.kernel.org/stable/c/9a7f63283af6befc0f91d549f4f6917dff7479a9
- https://git.kernel.org/stable/c/af4ce124d7bd74cb839bbdaccffbb416771a56b5
- https://git.kernel.org/stable/c/b2f423fda64fb49213aa0ed5056079cf295a5df2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.180