We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53091

ext4: update s_journal_inum if it changes after journal replay



Description

In the Linux kernel, the following vulnerability has been resolved: ext4: update s_journal_inum if it changes after journal replay When mounting a crafted ext4 image, s_journal_inum may change after journal replay, which is obviously unreasonable because we have successfully loaded and replayed the journal through the old s_journal_inum. And the new s_journal_inum bypasses some of the checks in ext4_get_journal(), which may trigger a null pointer dereference problem. So if s_journal_inum changes after the journal replay, we ignore the change, and rewrite the current journal_inum to the superblock.

Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 499fef2030fb754c68b1c7cb3a799a3bc1d0d925
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 70e66bdeae4d0f7c8e87762f425b68aedd5e8955
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ee0c5277d4fab920bd31345c49e193ecede9ecef
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 3039d8b8692408438a618fac2776b629852663c3
affected

Default status
affected

5.15.104
unaffected

6.1.21
unaffected

6.2.8
unaffected

6.3
unaffected

References

git.kernel.org/...c/499fef2030fb754c68b1c7cb3a799a3bc1d0d925

git.kernel.org/...c/70e66bdeae4d0f7c8e87762f425b68aedd5e8955

git.kernel.org/...c/ee0c5277d4fab920bd31345c49e193ecede9ecef

git.kernel.org/...c/3039d8b8692408438a618fac2776b629852663c3

cve.org (CVE-2023-53091)

nvd.nist.gov (CVE-2023-53091)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53091

Support options

Helpdesk Chat, Email, Knowledgebase