{"uuid": "f19abd82-2a86-40bd-9055-ad7178aba184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-53137", "type": "seen", "source": "https://t.me/cvedetector/24359", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-53137 - Linux Kernel Ext4 Directory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-53137 \nPublished : May 2, 2025, 4:15 p.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \next4: Fix possible corruption when moving a directory  \n  \nWhen we are renaming a directory to a different directory, we need to  \nupdate '..' entry in the moved directory. However nothing prevents moved  \ndirectory from being modified and even converted from the inline format  \nto the normal format. When such race happens the rename code gets  \nconfused and we crash. Fix the problem by locking the moved directory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T20:07:46.000000Z"}