VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53796

CVE-2023-53796

Description

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix information leak in f2fs_move_inline_dirents()

When converting an inline directory to a regular one, f2fs is leaking uninitialized memory to disk because it doesn't initialize the entire directory block. Fix this by zero-initializing the block.

This bug was introduced by commit 4ec17d688d74 ("f2fs: avoid unneeded initializing when converting inline dentry"), which didn't consider the security implications of leaking uninitialized memory to disk.

This was found by running xfstest generic/435 on a KMSAN-enabled kernel.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Linux kernel's f2fs filesystem leaks uninitialized memory to disk when converting an inline directory due to missing zero-initialization, allowing possible information disclosure.

Vulnerability

Details The vulnerability resides in f2fs_move_inline_dentrs() within the Linux kernel's f2fs filesystem. When converting an inline directory to a regular one, the function fails to zero-initialize the entire directory block before writing it to disk. This is a regression introduced by commit 4ec17d688d74 ("f2fs: avoid unneeded initializing when converting inline dentry"), which inadvertently removed initialization, leading to uninitialized memory being leaked to disk [1].

Attack

Vector Exploitation requires the ability to trigger conversion of an inline directory on an f2fs filesystem. This can be achieved by creating and then moving a sufficient number of directory entries to exceed the inline capacity, causing the kernel to convert the directory. No special privileges beyond standard file system operations are needed, but the attacker must have write access to the filesystem. The leak occurs during the conversion process, which is triggered by user-space operations.

Impact

The uninitialized memory may contain sensitive kernel heap data. When written to disk, this data persists and could be read by an attacker with access to the raw block device or through a subsequent read of the directory content. This constitutes an information disclosure vulnerability that could expose secrets such as kernel addresses or other sensitive data.

Mitigation

The fix was applied in Linux kernel commits that zero-initialize the directory block before writing. Users should update their kernels to include the fix. The vulnerability was discovered via KMSAN (Kernel Memory Sanitizer) while running xfstest generic/435.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.