Vulnerability Details : CVE-2023-52590
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: Avoid touching renamed directory if parent does not change
The VFS will not be locking moved directory if its parent does not
change. Change ocfs2 rename code to avoid touching renamed directory if
its parent does not change as without locking that can corrupt the
filesystem.
Products affected by CVE-2023-52590
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-52590
0.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-52590
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2025-02-14 |
CWE ids for CVE-2023-52590
-
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-52590
-
https://git.kernel.org/stable/c/9d618d19b29c2943527e3a43da0a35aea91062fc
ocfs2: Avoid touching renamed directory if parent does not change - kernel/git/stable/linux.git - Linux kernel stable treeMailing List;Patch
-
https://git.kernel.org/stable/c/de940cede3c41624e2de27f805b490999f419df9
ocfs2: Avoid touching renamed directory if parent does not change - kernel/git/stable/linux.git - Linux kernel stable treeMailing List;Patch
Jump to