CVE-2023-54153

Source
https://cve.org/CVERecord?id=CVE-2023-54153
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54153.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54153
Downstream
Related
Published
2025-12-24T13:07:04.007Z
Modified
2026-03-28T17:44:34.734617527Z
Summary
ext4: turn quotas off if mount failed after enabling quotas
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: turn quotas off if mount failed after enabling quotas

Yi found during a review of the patch "ext4: don't BUG on inconsistent journal feature" that when ext4markrecovery_complete() returns an error value, the error handling path does not turn off the enabled quotas, which triggers the following kmemleak:

================================================================ unreferenced object 0xffff8cf68678e7c0 (size 64): comm "mount", pid 746, jiffies 4294871231 (age 11.540s) hex dump (first 32 bytes): 00 90 ef 82 f6 8c ff ff 00 00 00 00 41 01 00 00 ............A... c7 00 00 00 bd 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000c561ef24>] __kmemcachealloc_node+0x4d4/0x880 [<00000000d4e621d7>] kmalloctrace+0x39/0x140 [<00000000837eee74>] v2readfileinfo+0x18a/0x3a0 [<0000000088f6c877>] dquotloadquotasb+0x2ed/0x770 [<00000000340a4782>] dquotloadquotainode+0xc6/0x1c0 [<0000000089a18bd5>] ext4enablequotas+0x17e/0x3a0 [ext4] [<000000003a0268fa>] __ext4fillsuper+0x3448/0x3910 [ext4] [<00000000b0f2a8a8>] ext4fillsuper+0x13d/0x340 [ext4] [<000000004a9489c4>] gettreebdev+0x1dc/0x370 [<000000006e723bf1>] ext4gettree+0x1d/0x30 [ext4] [<00000000c7cb663d>] vfsgettree+0x31/0x160 [<00000000320e1bed>] donewmount+0x1d5/0x480 [<00000000c074654c>] pathmount+0x22e/0xbe0 [<0000000003e97a8e>] domount+0x95/0xc0 [<000000002f3d3736>] __x64sysmount+0xc4/0x160

[<0000000027d2140c>] dosyscall64+0x3f/0x90

To solve this problem, we add a "failedmount10" tag, and call ext4quotaoffumount() in this tag to release the enabled qoutas.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54153.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
11215630aada28307ba555a43138db6ac54fa825
Fixed
c327b83c59ee938792a0300df646efac39c7d6a7
Fixed
deef86fa3005cbb61ae8aa5729324c09b3f4ba73
Fixed
77c3ca1108eb4a26db4f256c42b271a430cebc7d
Fixed
d13f99632748462c32fc95d729f5e754bab06064
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
60e2824ab30a19c7aaf5a3932bc155d18b2cd816
Last affected
a6d49257cbe53c7bca1a0353a6443f53cbed9cc7
Last affected
2e7312ddaf629eecf4702b662da477a3bc39c31a
Last affected
d558851e5ff443b020245b7a1a455c55accf740b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54153.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.15.121
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.40
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54153.json"