CVE-2023-53626

Source
https://cve.org/CVERecord?id=CVE-2023-53626
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53626.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53626
Downstream
Related
Published
2025-10-07T15:19:30.895Z
Modified
2026-03-23T05:09:05.371336793Z
Summary
ext4: fix possible double unlock when moving a directory
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix possible double unlock when moving a directory

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53626.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8dac5a63cf79707b547ea3d425fead5f4482198f
Fixed
c16cbd8233d6c58fc488545393e49b5d55729990
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0c440f14558bfacd22c6935ae1fd4b2a09e96b5d
Fixed
020166bc6669ca9fb267ebd96bd88c4fb64a5d46
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c50fc503ee1b97f12c98e26afc39fdaebebcf04f
Fixed
1c93c42c7bb23057bde8a0a2ab834927ff64d20c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b0bb13612292ca90fa4c2a7e425375649bc50d3e
Fixed
e71eb4dca41f0f36823724ced0406bb2dbdd5506
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
291cd19d107e197306869cb3237c1bba62d13182
Fixed
43ce288ab5d7274a4a141d7f5e3ed2ab7b41f8a2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0813299c586b175d7edb25f56412c54b812d0379
Fixed
70e42feab2e20618ddd0cbfc4ab4b08628236ecd

Affected versions

v5.*
v5.10.175
v5.15.103
v5.4.237
v6.*
v6.1.20
v6.2
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.7
v6.3-rc1
v6.3-rc2

Database specific

vanir_signatures
[
    {
        "signature_version": "v1",
        "digest": {
            "length": 4269.0,
            "function_hash": "217906776403604890377596566266492608627"
        },
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2023-53626-99ae64b1",
        "target": {
            "function": "ext4_rename",
            "file": "fs/ext4/namei.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c16cbd8233d6c58fc488545393e49b5d55729990"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "318633274779173257430029097588522725613",
                "272133420334307645039421773527110603697",
                "314525930098101358686803012445100312676",
                "152781735617145095827982269476494461440",
                "218460920696971279425691889333038100771",
                "44530202192399143328633955735003603070",
                "156339106691010244580484625747649047994"
            ]
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2023-53626-e1bd65a6",
        "target": {
            "file": "fs/ext4/namei.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@70e42feab2e20618ddd0cbfc4ab4b08628236ecd"
    },
    {
        "digest": {
            "length": 5059.0,
            "function_hash": "214332419382900121042846547371949746917"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2023-53626-e753d7cf",
        "target": {
            "function": "ext4_rename",
            "file": "fs/ext4/namei.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@70e42feab2e20618ddd0cbfc4ab4b08628236ecd"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "318633274779173257430029097588522725613",
                "272133420334307645039421773527110603697",
                "314525930098101358686803012445100312676",
                "152781735617145095827982269476494461440",
                "218460920696971279425691889333038100771",
                "44530202192399143328633955735003603070",
                "156339106691010244580484625747649047994"
            ]
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2023-53626-efe79cb6",
        "target": {
            "file": "fs/ext4/namei.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c16cbd8233d6c58fc488545393e49b5d55729990"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53626.json"