
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's Squashfs filesystem handling has been identified (CVE-2023-52933). The issue involves two flaws in the handling and sanity checking of the xattr_ids count in the filesystem, discovered through a Sysbot corrupted filesystem. The vulnerability was disclosed on March 27, 2025, affecting the Linux kernel's Squashfs implementation (NVD).
The vulnerability stems from two distinct computation overflow issues due to incorrect typing in the xattrids count handling. On 64-bit systems, a signed integer xattrids variable causes sign extension, leading to variable overflow in SQUASHFSXATTR*(A) macros. On 32-bit systems, the integer variable isn't widened by the unsigned long type of the sizeof operator, causing overflow when multiplied. Both scenarios result in a length computation of 0, which fails to properly validate the filesystem structure (NVD).
When exploited, this vulnerability could lead to improper validation of filesystem structures, potentially allowing a corrupted filesystem to bypass security checks. The specific impact involves the incorrect computation of table lengths and improper validation of filesystem boundaries (NVD).
The issue has been resolved by changing the xattr_ids variable to be 'unsigned int' for 64-bit systems and casting the variable to u64 in the affected macro for 32-bit systems. This fix ensures proper computation widening and prevents the overflow conditions (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."