CVE-2023-53089

Source
https://cve.org/CVERecord?id=CVE-2023-53089
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53089.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53089
Downstream
Related
Published
2025-05-02T15:55:35.498Z
Modified
2026-04-03T13:14:23.286665038Z
Summary
ext4: fix task hung in ext4_xattr_delete_inode
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix task hung in ext4xattrdelete_inode

Syzbot reported a hung task problem:

INFO: task syz-executor232:5073 blocked for more than 143 seconds. Not tainted 6.2.0-rc2-syzkaller-00024-g512dee0c00ad #0 "echo 0 > /proc/sys/kernel/hungtasktimeoutsecs" disables this message. task:syz-exec232 state:D stack:21024 pid:5073 ppid:5072 flags:0x00004004 Call Trace: <TASK> contextswitch kernel/sched/core.c:5244 [inline] __schedule+0x995/0xe20 kernel/sched/core.c:6555 schedule+0xcb/0x190 kernel/sched/core.c:6631 __waitonfreeinginode fs/inode.c:2196 [inline] findinodefast+0x35a/0x4c0 fs/inode.c:950 igetlocked+0xb1/0x830 fs/inode.c:1273 __ext4iget+0x22e/0x3ed0 fs/ext4/inode.c:4861 ext4xattrinodeiget+0x68/0x4e0 fs/ext4/xattr.c:389 ext4xattrinodedecrefall+0x1a7/0xe50 fs/ext4/xattr.c:1148 ext4xattrdeleteinode+0xb04/0xcd0 fs/ext4/xattr.c:2880 ext4evictinode+0xd7c/0x10b0 fs/ext4/inode.c:296 evict+0x2a4/0x620 fs/inode.c:664 ext4orphancleanup+0xb60/0x1340 fs/ext4/orphan.c:474 __ext4fillsuper fs/ext4/super.c:5516 [inline] ext4fillsuper+0x81cd/0x8700 fs/ext4/super.c:5644 gettreebdev+0x400/0x620 fs/super.c:1282 vfsgettree+0x88/0x270 fs/super.c:1489 donewmount+0x289/0xad0 fs/namespace.c:3145 do_mount fs/namespace.c:3488 [inline] __dosysmount fs/namespace.c:3697 [inline] _sesysmount+0x2d3/0x3c0 fs/namespace.c:3674 dosyscallx64 arch/x86/entry/common.c:50 [inline] dosyscall64+0x3d/0xb0 arch/x86/entry/common.c:80 entrySYSCALL64afterhwframe+0x63/0xcd RIP: 0033:0x7fa5406fd5ea RSP: 002b:00007ffc7232f968 EFLAGS: 00000202 ORIGRAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fa5406fd5ea RDX: 0000000020000440 RSI: 0000000020000000 RDI: 00007ffc7232f970 RBP: 00007ffc7232f970 R08: 00007ffc7232f9b0 R09: 0000000000000432 R10: 0000000000804a03 R11: 0000000000000202 R12: 0000000000000004 R13: 0000555556a7a2c0 R14: 00007ffc7232f9b0 R15: 0000000000000000

</TASK>

The problem is that the inode contains an xattr entry with eainum of 15 when cleaning up an orphan inode <15>. When evict inode <15>, the reference counting of the corresponding EA inode is decreased. When EA inode <15> is found by findinode_fast() in __ext4iget(), it is found that the EA inode holds the IFREEING flag and waits for the EA inode to complete deletion. As a result, when inode <15> is being deleted, we wait for inode <15> to complete the deletion, resulting in an infinite loop and triggering Hung Task. To solve this problem, we only need to check whether the ino of EA inode and parent is the same before getting EA inode.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53089.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e50e5129f384ae282adebfb561189cdb19b81cee
Fixed
efddc7e106fdf8d1f62d45e79de78f63b7c04fba
Fixed
64b72f5e7574020dea62ab733d88a54d903c42a1
Fixed
2c96c52aeaa6fd9163cfacdd98778b4a0398ef18
Fixed
a98160d8f3e6242ca9b7f443f26e7ef3a61ba684
Fixed
1aec41c98cce61d19ce89650895e51b9f3cdef13
Fixed
94fd091576b12540924f6316ebc0678e84cb2800
Fixed
73f7987fe1b82596f1a380e85cd0097ebaae7e01
Fixed
0f7bfd6f8164be32dbbdf36aa1e5d00485c53cd7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53089.json"