-

CVE-2023-54311

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix deadlock when converting an inline directory in nojournal mode

In no journal mode, ext4_finish_convert_inline_dir() can self-deadlock
by calling ext4_handle_dirty_dirblock() when it already has taken the
directory lock.  There is a similar self-deadlock in
ext4_incvert_inline_data_nolock() for data files which we'll fix at
the same time.

A simple reproducer demonstrating the problem:

    mke2fs -Fq -t ext2 -O inline_data -b 4k /dev/vdc 64
    mount -t ext4 -o dirsync /dev/vdc /vdc
    cd /vdc
    mkdir file0
    cd file0
    touch file0
    touch file1
    attr -s BurnSpaceInEA -V abcde .
    touch supercalifragilisticexpialidocious
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < b4fa4768c9acff77245d672d855d2c88294850b1
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
Version < 5f8b55136ad787aed2c184f7cb3e93772ae637a3
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
Version < 640c8c365999c6f23447ac766437236ad88317c5
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
Version < 665cc3ba50330049524c1d275bc840a8f28dde73
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
Version < 0b1c4357bb21d9770451a1bdb8d419ea10bada88
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
Version < 804de0c72cd473e186ca4e1f6287d45431b14e5a
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
Version < f4ce24f54d9cca4f09a395f3eecce20d6bec4663
Version 3c47d54170b6a678875566b1b8d6dcf57904e49b
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.8
Status affected
Version < 3.8
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.112
Status unaffected
Version <= 6.1.*
Version 6.1.29
Status unaffected
Version <= 6.2.*
Version 6.2.16
Status unaffected
Version <= 6.3.*
Version 6.3.3
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.