Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-53766

Опубликовано: 08 дек. 2025
Источник: redhat
CVSS3: 4.7
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref.

JFS filesystem code neglects to verify whether the filesystem is mounted read-only before initiating transactions in txBegin(). When write operations are attempted on a read-only mount, the missing check allows execution to proceed with uninitialized transaction structures, culminating in a NULL pointer dereference and kernel crash.

Отчет

JFS usage has declined significantly in modern deployments. Exploitation requires local filesystem access and specific mount configurations. ext4 or XFS are recommended as alternatives where possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2419843kernel: FS: JFS: Check for read-only mounted filesystem in txBegin

EPSS

Процентиль: 11%
0.00036
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref.

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref.

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: F ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: FS: JFS: Check for read-only mounted filesystem in txBegin This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref.

CVSS3: 7
fstec
почти 3 года назад

Уязвимость функции txBegin() модуля fs/jfs/jfs_txnmgr.c файловой системы JFS ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 11%
0.00036
Низкий

4.7 Medium

CVSS3