VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54311

CVE-2023-54311

Description

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix deadlock when converting an inline directory in nojournal mode

In no journal mode, ext4_finish_convert_inline_dir() can self-deadlock by calling ext4_handle_dirty_dirblock() when it already has taken the directory lock. There is a similar self-deadlock in ext4_incvert_inline_data_nolock() for data files which we'll fix at the same time.

A simple reproducer demonstrating the problem:

mke2fs -Fq -t ext2 -O inline_data -b 4k /dev/vdc 64 mount -t ext4 -o dirsync /dev/vdc /vdc cd /vdc mkdir file0 cd file0 touch file0 touch file1 attr -s BurnSpaceInEA -V abcde . touch supercalifragilisticexpialidocious

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A deadlock in ext4's inline directory conversion in nojournal mode can cause a system hang, fixed by avoiding a lock recursion in ext4_finish_convert_inline_dir.

Vulnerability

CVE-2023-54311 describes a self-deadlock in the Linux kernel's ext4 filesystem when converting inline directories in nojournal mode. The bug occurs in ext4_finish_convert_inline_dir() when it calls ext4_handle_dirty_dirblock() while already holding the directory lock, leading to a deadlock. A similar issue exists in ext4_convert_inline_data_nolock() for data files.

Exploitation

An attacker with local access can trigger the deadlock by performing a sequence of operations on an ext4 filesystem mounted with -o dirsync and formatted with -O inline_data. The provided reproducer involves creating a directory, adding files, setting an extended attribute, and then creating a file with a long name, which forces the inline directory to be converted to a block-based directory.

Impact

Successful exploitation causes a system hang due to the deadlock, resulting in a denial of service (DoS). The vulnerability does not require special privileges beyond the ability to create files and directories on the affected filesystem.

Mitigation

The fix is included in Linux kernel stable updates. Patches are available in the kernel git repository [1][2][3]. Users should apply the latest kernel updates from their distribution.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.