CVE-2023-52444
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2023-52444 is a vulnerability in the Linux kernel's F2FS (Flash-Friendly File System) implementation that was discovered and disclosed on February 22, 2024. The vulnerability affects Linux kernel versions from 4.2.0 up to versions before 4.19.306, 5.4.268, 5.10.209, and 5.15.148. The issue relates to directory entry (dirent) corruption during rename operations with whiteout functionality (NVD).

Technical details

The vulnerability occurs in the f2fs_rename() function when handling cross-directory rename operations with whiteout functionality. The bug manifests when the code fails to properly update the '..' link to the new directory during certain rename operations. The issue stems from a condition where f2fs_set_link() is not called when it should be, leading to incorrect inode number references. This can be triggered using the renameat2 system call with the RENAME_WHITEOUT flag. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

When exploited, this vulnerability can cause directory entry corruption in the F2FS filesystem. The corruption specifically affects the parent directory references ('..' entries), potentially leading to filesystem inconsistencies and data integrity issues. This can result in filesystem corruption that may require filesystem check (fsck) operations to repair (Kernel Patch).

Mitigation and workarounds

The vulnerability has been fixed in multiple Linux kernel versions through patches that modify the f2fs_rename() function to properly handle directory entry updates during rename operations. The fix has been backported to various stable kernel versions and is available in Linux kernel updates for major distributions including Ubuntu and Debian (Ubuntu Security, Debian Security).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-33230HIGH7.3
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-33229HIGH7.3
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-33228HIGH7.3
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-33231MEDIUM6.7
  • Linux DebianLinux Debian
  • nvidia-cuda-toolkit
NoNoJan 20, 2026
CVE-2025-15281N/AN/A
  • WolfiWolfi
  • glibc-langpack-anp
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management