CVE-2023-53835

Source
https://cve.org/CVERecord?id=CVE-2023-53835
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53835.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53835
Downstream
Published
2025-12-09T01:29:50.850Z
Modified
2026-04-10T05:07:00.756166Z
Summary
ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled

When a file system currently mounted read/only is remounted read/write, if we clear the SB_RDONLY flag too early, before the quota is initialized, and there is another process/thread constantly attempting to create a directory, it's possible to trigger the

WARN_ON_ONCE(dquot_initialize_needed(inode));

in ext4xattrblock_set(), with the following stack trace:

WARNING: CPU: 0 PID: 5338 at fs/ext4/xattr.c:2141 ext4xattrblockset+0x2ef2/0x3680 RIP: 0010:ext4xattrblockset+0x2ef2/0x3680 fs/ext4/xattr.c:2141 Call Trace: ext4xattrsethandle+0xcd4/0x15c0 fs/ext4/xattr.c:2458 ext4initxattrs+0xa3/0x110 fs/ext4/xattrsecurity.c:44 securityinodeinitsecurity+0x2df/0x3f0 security/security.c:1147 __ext4newinode+0x347e/0x43d0 fs/ext4/ialloc.c:1324 ext4_mkdir+0x425/0xce0 fs/ext4/namei.c:2992 vfsmkdir+0x29d/0x450 fs/namei.c:4038 domkdirat+0x264/0x520 fs/namei.c:4061 __dosysmkdirat fs/namei.c:4076 [inline] __sesysmkdirat fs/namei.c:4074 [inline] __x64sysmkdirat+0x89/0xa0 fs/namei.c:4074

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53835.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
5c87115520d2451f5689be7d9a463450d5b1bd96
Fixed
c53936d9fb35287ed81ec412a5b494729268a64d
Fixed
cd2341c26fb6cf45445de70cfd01022cb634746b
Fixed
5570ac70264021c3a9b0c55e0e6d7a90f25cebbc
Fixed
a44be64bbecb15a452496f60db6eacfee2b59c79

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53835.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.181
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.113
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.30
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53835.json"