CVE-2023-53091
ext4: update s_journal_inum if it changes after journal replay
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: ext4: update s_journal_inum if it changes after journal replay When mounting a crafted ext4 image, s_journal_inum may change after journal
replay, which is obviously unreasonable because we have successfully loaded
and replayed the journal through the old s_journal_inum. And the new
s_journal_inum bypasses some of the checks in ext4_get_journal(), which
may trigger a null pointer dereference problem. So if s_journal_inum
changes after the journal replay, we ignore the change, and rewrite the
current journal_inum to the superblock.
In the Linux kernel, the following vulnerability has been resolved: ext4: update s_journal_inum if it changes after journal replay When mounting a crafted ext4 image, s_journal_inum may change after journal replay, which is obviously unreasonable because we have successfully loaded and replayed the journal through the old s_journal_inum. And the new s_journal_inum bypasses some of the checks in ext4_get_journal(), which may trigger a null pointer dereference problem. So if s_journal_inum changes after the journal replay, we ignore the change, and rewrite the current journal_inum to the superblock.
This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-05-02 CVE Reserved
- 2025-05-02 CVE Published
- 2026-02-26 EPSS Updated
- 2026-05-11 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
| URL | Tag | Source |
|---|---|---|
| https://git.kernel.org/stable/c/345c0dbf3a30872d9b204db96b5857cd00808cae | Vuln. Introduced | |
| https://git.kernel.org/stable/c/51890201da4d654f6ca131bc45a0e892bb10de1d | Vuln. Introduced | |
| https://git.kernel.org/stable/c/7eff961ca9f364be255d279346517ba0158ec8e3 | Vuln. Introduced | |
| https://git.kernel.org/stable/c/a9855260fe8d8680bf8c4f0d8303b696c861e99b | Vuln. Introduced | |
| https://git.kernel.org/stable/c/795762468125a6412c089651e74f780bee154118 | Vuln. Introduced | |
| https://git.kernel.org/stable/c/2fd4629de51974002f4e9cf1a35a1926dd6c9d99 | Vuln. Introduced |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.2 < 5.15.104 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.2 < 5.15.104" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.2 < 6.1.21 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.2 < 6.1.21" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.2 < 6.2.8 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.2 < 6.2.8" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.2 < 6.3 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.2 < 6.3" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.16.85 Search vendor "Linux" for product "Linux Kernel" and version "3.16.85" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 4.4.221 Search vendor "Linux" for product "Linux Kernel" and version "4.4.221" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 4.9.221 Search vendor "Linux" for product "Linux Kernel" and version "4.9.221" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 4.14.178 Search vendor "Linux" for product "Linux Kernel" and version "4.14.178" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 4.19.73 Search vendor "Linux" for product "Linux Kernel" and version "4.19.73" | en |
Affected
| ||||||
