CVE-2023-54281
Deadlock Vulnerability in Linux Kernel Btrfs Inode Lookup ioctl
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for warnings about possible circular locking dependencies related to btrfs, specifically messages like 'WARNING: possible circular locking dependency detected' involving btrfs-tree locks. You can check the kernel log using commands such as 'dmesg | grep -i btrfs' or 'journalctl -k | grep -i btrfs' to look for these warnings.
How can this vulnerability impact me? :
The vulnerability can lead to a deadlock situation in the Linux kernel when accessing the btrfs filesystem, potentially causing system hangs or crashes during inode lookup operations. This can affect system stability and availability, especially on systems using the btrfs filesystem.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's btrfs filesystem during the inode lookup ioctl operation. Specifically, when the system calls btrfs_iget() to get an inode reference while holding a root's btree lock, it may need to lock another or the same path in the same root btree if the inode is not already loaded in memory. This can cause a deadlock due to a circular locking dependency, which is detected by the kernel's lock dependency checker (lockdep).
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this btrfs inode lookup ioctl deadlock issue is resolved. Since the vulnerability involves kernel locking deadlocks, applying the patch or upgrading to a fixed kernel version is necessary to prevent the deadlock condition.