VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2023-53766

CVE-2023-53766

Description

In the Linux kernel, the following vulnerability has been resolved:

FS: JFS: Check for read-only mounted filesystem in txBegin

This patch adds a check for read-only mounted filesystem in txBegin before starting a transaction potentially saving from NULL pointer deref.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In JFS, a missing read-only check in txBegin could lead to NULL pointer dereference, patched in Linux kernel.

Vulnerability

Description The JFS filesystem implementation in the Linux kernel lacked a check to verify that the filesystem is not mounted read-only before starting a transaction in the txBegin function. This oversight could result in a NULL pointer dereference when attempting to begin a transaction on a read-only mount [1].

Exploitation

An attacker with the ability to mount a JFS filesystem as read-only and trigger a filesystem operation that calls txBegin could potentially exploit this issue. The attack requires local access and control over filesystem mounting.

Impact

Successful exploitation leads to a NULL pointer dereference, typically causing a kernel panic and denial of service. No privilege escalation is mentioned.

Mitigation

The vulnerability has been patched in the Linux kernel with commits backported to stable branches [1], [2], [3], and [4]. Users should update their kernel to the latest version to mitigate the risk.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.