CVE-2023-54069

Source
https://cve.org/CVERecord?id=CVE-2023-54069
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54069.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54069
Downstream
Related
Published
2025-12-24T12:23:13.504Z
Modified
2026-03-31T17:29:56.349869625Z
Summary
ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix BUG in ext4mbnewinodepa() due to overflow

When we calculate the end position of ext4freeextent, this position may be exactly where ext4lblkt (i.e. uint) overflows. For example, if acgex.felogical is 4294965248 and acoriggoallen is 2048, then the computed end is 0x100000000, which is 0. If ac->acoex.felogical is not the first case of adjusting the best extent, that is, newbexend > 0, the following BUGON will be triggered:

========================================================= kernel BUG at fs/ext4/mballoc.c:5116! invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 3 PID: 673 Comm: xfsio Tainted: G E 6.5.0-rc1+ #279 RIP: 0010:ext4mbnewinodepa+0xc5/0x430 Call Trace: <TASK> ext4mbusebestfound+0x203/0x2f0 ext4mbtrybestfound+0x163/0x240 ext4mbregularallocator+0x158/0x1550 ext4mbnewblocks+0x86a/0xe10 ext4extmapblocks+0xb0c/0x13a0 ext4mapblocks+0x2cd/0x8f0 ext4iomapbegin+0x27b/0x400 iomap_iter+0x222/0x3d0 __iomapdiorw+0x243/0xcb0

iomapdiorw+0x16/0x80

A simple reproducer demonstrating the problem:

mkfs.ext4 -F /dev/sda -b 4096 100M
mount /dev/sda /tmp/test
fallocate -l1M /tmp/test/tmp
fallocate -l10M /tmp/test/file
fallocate -i -o 1M -l16777203M /tmp/test/file
fsstress -d /tmp/test -l 0 -n 100000 -p 8 &
sleep 10 && killall -9 fsstress
rm -f /tmp/test/tmp
xfs_io -c "open -ad /tmp/test/file" -c "pwrite -S 0xff 0 8192"

We simply refactor the logic for adjusting the best extent by adding a temporary ext4freeextent ex and use extentlogicalend() to avoid overflow, which also simplifies the code.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54069.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8659c5f4ffaacbe932849b98462c3d635b4eacea
Fixed
83ecffd40c65844a73c2e93d7c841455786605ac
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fc7237e191b99f88e859316fab2b06c2c26c8344
Fixed
58fe961c606c446f5612f6897827b1cac42c2e89
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
613f6cde5ebb005a37fda117cdda7b4126170c13
Fixed
f2c3a3aa6f11ad9878dbc3a067b0633e07b586c1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9d4430b7f862ce8835ca4e054b6916d15c8e0862
Fixed
fcefddf3a151b2c416b20120c06bb1ba9ad676fb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
93cdf49f6eca5e23f6546b8f28457b2e6a6961d9
Fixed
b7e9ec38b6a0beb5a49cd1e76be0a9a07c218e90
Fixed
bc056e7163ac7db945366de219745cf94f32a3e6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
46772ab99409cc72241227dd8f5295f358233fda
Last affected
25a60b4533268477920faaeebd99e7e69c0735cd
Last affected
cec4ef62b36b04e0bc8905732adab091f4bc1cfd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54069.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.260
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.200
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.138
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.61
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54069.json"