Bug 2363696 (CVE-2023-53137)

Summary: CVE-2023-53137 kernel: ext4: Fix possible corruption when moving a directory
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: dfreiber, drow, jburrell, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
This CVE-2023-53137 has been officially rejected upstream because the original ext4-level fix it referred to (8dac5a63cf79707b...) was later reverted in Linux v6.5 (3658840cd363 ext4: Remove ext4 locking of moved directory). The upstream maintainers determined that the problem was more appropriately addressed at the VFS (Virtual Filesystem) layer, rather than within the ext4 filesystem itself. A new set of commits, starting with 28eceeda130f (fs: Lock moved directories) and followed by several refinements (66d8fc0539b0, 22e111ed6c83), implemented proper directory move locking across all filesystems. These commits are present in all maintained stable and LTS kernels, effectively rendering the ext4-specific fix obsolete. However, in older kernel branches (around v6.3–v6.4) that contain only the ext4-level patch and not the VFS-level locking changes, a narrow race condition could still theoretically occur when renaming directories, potentially leading to metadata corruption. Because triggering this race requires local access, precise timing, and provides no privilege escalation, the impact level is Low and the CVSS score should reflect low severity. In summary, while the CVE has been rejected upstream due to the alternate global fix, it can still be treated as a Low-impact condition for legacy kernels that include 8dac5a63cf79707b but lack the VFS-level locking commits (28eceeda130f and later).
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-05-02 16:02:11 UTC
In the Linux kernel, the following vulnerability has been resolved:

ext4: Fix possible corruption when moving a directory

When we are renaming a directory to a different directory, we need to
update '..' entry in the moved directory. However nothing prevents moved
directory from being modified and even converted from the inline format
to the normal format. When such race happens the rename code gets
confused and we crash. Fix the problem by locking the moved directory.

Comment 1 Avinash Hanwate 2025-05-05 06:17:49 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050237-CVE-2023-53137-f8bc@gregkh/T