{"id":"CVE-2023-54305","summary":"ext4: refuse to create ea block when umounted","details":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: refuse to create ea block when umounted\n\nThe ea block expansion need to access s_root while it is\nalready set as NULL when umount is triggered. Refuse this\nrequest to avoid panic.","modified":"2026-03-20T12:33:32.870140Z","published":"2025-12-30T12:23:39.163Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54305.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05cbf6ddd9847c7b4f0662c048f195b09405a9d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0dc0fa313bb4e86382a3e7125429710d44383196"},{"type":"WEB","url":"https://git.kernel.org/stable/c/116008ada3d0de4991099edaf6b8c2e9cd6f225a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/21f6a80d9234422e2eb445734b22c78fc5bf6719"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a458a8c1d1fc4e10a1813786132b09a3863ad3f2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a92b67e768bde433b9385cde56c09deb58db269e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aedea161d031502a423ed1c7597754681a4f8cda"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f31173c19901a96bb2ebf6bcfec8a08df7095c91"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54305.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54305"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e50e5129f384ae282adebfb561189cdb19b81cee"},{"fixed":"aedea161d031502a423ed1c7597754681a4f8cda"},{"fixed":"21f6a80d9234422e2eb445734b22c78fc5bf6719"},{"fixed":"a92b67e768bde433b9385cde56c09deb58db269e"},{"fixed":"0dc0fa313bb4e86382a3e7125429710d44383196"},{"fixed":"116008ada3d0de4991099edaf6b8c2e9cd6f225a"},{"fixed":"05cbf6ddd9847c7b4f0662c048f195b09405a9d0"},{"fixed":"a458a8c1d1fc4e10a1813786132b09a3863ad3f2"},{"fixed":"f31173c19901a96bb2ebf6bcfec8a08df7095c91"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54305.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.13.0"},{"fixed":"4.14.308"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.276"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.173"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.99"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54305.json"}}],"schema_version":"1.7.5"}