CVE-2023-53672

Source
https://cve.org/CVERecord?id=CVE-2023-53672
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53672.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53672
Downstream
Related
Published
2025-10-07T15:21:28.975Z
Modified
2026-03-20T12:33:17.552300Z
Summary
btrfs: output extra debug info if we failed to find an inline backref
Details

In the Linux kernel, the following vulnerability has been resolved:

btrfs: output extra debug info if we failed to find an inline backref

[BUG] Syzbot reported several warning triggered inside lookupinlineextent_backref().

[CAUSE] As usual, the reproducer doesn't reliably trigger locally here, but at least we know the WARN_ON() is triggered when an inline backref can not be found, and it can only be triggered when @insert is true. (I.e. inserting a new inline backref, which means the backref should already exist)

[ENHANCEMENT] After the WARN_ON(), dump all the parameters and the extent tree leaf to help debug.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53672.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
492104c866cb1b62a11393adccb477f5cd2c7768
Fixed
376b41524b71e494514720bd6114325b0a2ed19c
Fixed
400e08a16604b534fdd82c5a288fa150d04f5f79
Fixed
7afbfde45d665953b4d5a42a721e15bf0315d89b
Fixed
b7c3cf2f6c42e6688b1c37215a0b1663f982f915
Fixed
6994f806c6d1ae8b59344d3700358547f3b3fe1d
Fixed
28062cd6eda04035d8f6ded2001292ac8b496149
Fixed
e70ba449b04b40584bdabb383d10455397cbf177
Fixed
7f72f50547b7af4ddf985b07fc56600a4deba281

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53672.json"