DEBIAN-CVE-2023-53526

Source
https://security-tracker.debian.org/tracker/CVE-2023-53526
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53526.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-53526
Upstream
Published
2025-10-01T12:15:57Z
Modified
2025-10-02T09:16:09.124173Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: jbd2: check 'jh->btransaction' before removing it from checkpoint Following process will corrupt ext4 image: Step 1: jbd2journalcommittransaction _jbd2journalinsertcheckpoint(jh, committransaction) // Put jh into trans1->tcheckpointlist journal->jcheckpointtransactions = committransaction // Put trans1 into journal->jcheckpointtransactions Step 2: dogetwriteaccess testclearbufferdirty(bh) // clear buffer dirty,set jbd dirty _jbd2journalfilebuffer(jh, transaction) // jh belongs to trans2 Step 3: dropcache journalshrinkonecplist jbd2journaltryremovecheckpoint if (!trylockbuffer(bh)) // lock bh, true if (bufferdirty(bh)) // buffer is not dirty _jbd2journalremovecheckpoint(jh) // remove jh from trans1->tcheckpointlist Step 4: jbd2logdocheckpoint trans1 = journal->jcheckpointtransactions // jh is not in trans1->tcheckpointlist jbd2cleanupjournaltail(journal) // trans1 is done Step 5: Power cut, trans2 is not committed, jh is lost in next mounting. Fix it by checking 'jh->btransaction' before remove it from checkpoint.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.55-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}