{"id":"CVE-2023-54311","summary":"ext4: fix deadlock when converting an inline directory in nojournal mode","details":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix deadlock when converting an inline directory in nojournal mode\n\nIn no journal mode, ext4_finish_convert_inline_dir() can self-deadlock\nby calling ext4_handle_dirty_dirblock() when it already has taken the\ndirectory lock.  There is a similar self-deadlock in\next4_incvert_inline_data_nolock() for data files which we'll fix at\nthe same time.\n\nA simple reproducer demonstrating the problem:\n\n    mke2fs -Fq -t ext2 -O inline_data -b 4k /dev/vdc 64\n    mount -t ext4 -o dirsync /dev/vdc /vdc\n    cd /vdc\n    mkdir file0\n    cd file0\n    touch file0\n    touch file1\n    attr -s BurnSpaceInEA -V abcde .\n    touch supercalifragilisticexpialidocious","modified":"2026-03-20T12:33:33.177609Z","published":"2025-12-30T12:23:43.174Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54311.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0b1c4357bb21d9770451a1bdb8d419ea10bada88"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5f8b55136ad787aed2c184f7cb3e93772ae637a3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/640c8c365999c6f23447ac766437236ad88317c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/665cc3ba50330049524c1d275bc840a8f28dde73"},{"type":"WEB","url":"https://git.kernel.org/stable/c/804de0c72cd473e186ca4e1f6287d45431b14e5a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b4fa4768c9acff77245d672d855d2c88294850b1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f4ce24f54d9cca4f09a395f3eecce20d6bec4663"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54311.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54311"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3c47d54170b6a678875566b1b8d6dcf57904e49b"},{"fixed":"b4fa4768c9acff77245d672d855d2c88294850b1"},{"fixed":"5f8b55136ad787aed2c184f7cb3e93772ae637a3"},{"fixed":"640c8c365999c6f23447ac766437236ad88317c5"},{"fixed":"665cc3ba50330049524c1d275bc840a8f28dde73"},{"fixed":"0b1c4357bb21d9770451a1bdb8d419ea10bada88"},{"fixed":"804de0c72cd473e186ca4e1f6287d45431b14e5a"},{"fixed":"f4ce24f54d9cca4f09a395f3eecce20d6bec4663"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54311.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.8.0"},{"fixed":"5.4.243"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.180"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.29"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.3.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54311.json"}}],"schema_version":"1.7.5"}