Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-53137

Опубликовано: 02 мая 2025
Источник: redhat
CVSS3: 6.5

Описание

No description is available for this CVE.

Отчет

A race in ext4_rename() could let a local user who can rename directories trigger metadata corruption when the target directory changes format concurrently (inline to normal), potentially leading to filesystem corruption or crashes. The issue requires local access and precise timing (high complexity), but impacts integrity and availability of the filesystem. This issue does not provide a path for privilege escalation, but it can lead to a kernel crash and potentially result in file system corruption.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelAffected
Red Hat Enterprise Linux 7kernel-rtAffected
Red Hat Enterprise Linux 8kernelAffected
Red Hat Enterprise Linux 8kernel-rtAffected
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9kernel-rtAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=2363696kernel: ext4: Fix possible corruption when moving a directory

6.5 Medium

CVSS3

Связанные уязвимости

ubuntu
9 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

nvd
9 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

github
9 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ext4: Fix possible corruption when moving a directory When we are renaming a directory to a different directory, we need to update '..' entry in the moved directory. However nothing prevents moved directory from being modified and even converted from the inline format to the normal format. When such race happens the rename code gets confused and we crash. Fix the problem by locking the moved directory.

suse-cvrf
7 месяцев назад

Security update for the Linux Kernel

suse-cvrf
7 месяцев назад

Security update for the Linux Kernel

6.5 Medium

CVSS3