Metrics
Affected Vendors & Products
Thu, 10 Jul 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Sat, 07 Jun 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 05 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ext4: update s_journal_inum if it changes after journal replay When mounting a crafted ext4 image, s_journal_inum may change after journal replay, which is obviously unreasonable because we have successfully loaded and replayed the journal through the old s_journal_inum. And the new s_journal_inum bypasses some of the checks in ext4_get_journal(), which may trigger a null pointer dereference problem. So if s_journal_inum changes after the journal replay, we ignore the change, and rewrite the current journal_inum to the superblock. | |
Title | ext4: update s_journal_inum if it changes after journal replay | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-02T15:55:36.852Z
Updated: 2025-05-04T07:49:39.059Z
Reserved: 2025-05-02T15:51:43.552Z
Link: CVE-2023-53091

No data.

Status : Awaiting Analysis
Published: 2025-05-02T16:15:28.073
Modified: 2025-05-05T20:54:45.973
Link: CVE-2023-53091
