๐Ÿ” CVE Alert

CVE-2023-53091

UNKNOWN 0.0

ext4: update s_journal_inum if it changes after journal replay

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ext4: update s_journal_inum if it changes after journal replay When mounting a crafted ext4 image, s_journal_inum may change after journal replay, which is obviously unreasonable because we have successfully loaded and replayed the journal through the old s_journal_inum. And the new s_journal_inum bypasses some of the checks in ext4_get_journal(), which may trigger a null pointer dereference problem. So if s_journal_inum changes after the journal replay, we ignore the change, and rewrite the current journal_inum to the superblock.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
345c0dbf3a30872d9b204db96b5857cd00808cae < 499fef2030fb754c68b1c7cb3a799a3bc1d0d925 345c0dbf3a30872d9b204db96b5857cd00808cae < 70e66bdeae4d0f7c8e87762f425b68aedd5e8955 345c0dbf3a30872d9b204db96b5857cd00808cae < ee0c5277d4fab920bd31345c49e193ecede9ecef 345c0dbf3a30872d9b204db96b5857cd00808cae < 3039d8b8692408438a618fac2776b629852663c3 51890201da4d654f6ca131bc45a0e892bb10de1d 7eff961ca9f364be255d279346517ba0158ec8e3 a9855260fe8d8680bf8c4f0d8303b696c861e99b 795762468125a6412c089651e74f780bee154118 2fd4629de51974002f4e9cf1a35a1926dd6c9d99
Linux / Linux
5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/499fef2030fb754c68b1c7cb3a799a3bc1d0d925 git.kernel.org: https://git.kernel.org/stable/c/70e66bdeae4d0f7c8e87762f425b68aedd5e8955 git.kernel.org: https://git.kernel.org/stable/c/ee0c5277d4fab920bd31345c49e193ecede9ecef git.kernel.org: https://git.kernel.org/stable/c/3039d8b8692408438a618fac2776b629852663c3