CVE-2023-52583

Source
https://cve.org/CVERecord?id=CVE-2023-52583
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52583.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52583
Downstream
Related
Published
2024-03-06T06:45:19.319Z
Modified
2026-03-14T12:16:48.491463Z
Summary
ceph: fix deadlock or deadcode of misusing dget()
Details

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix deadlock or deadcode of misusing dget()

The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first.

But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52583.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9030aaf9bf0a1eee47a154c316c789e959638b0f
Fixed
eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6
Fixed
6ab4fd508fad942f1f1ba940492f2735e078e980
Fixed
e016e358461b89b231626fcf78c5c38e35c44fd3
Fixed
a9c15d6e8aee074fae66c04d114f20b84274fcca
Fixed
7f2649c94264d00df6b6ac27161e9f4372a3450e
Fixed
196b87e5c00ce021e164a5de0f0d04f4116a9160
Fixed
76cb2aa3421fee4fde706dec41b1344bc0a9ad67
Fixed
b493ad718b1f0357394d2cdecbf00a44a36fa085

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52583.json"