{"id":"CVE-2023-52583","summary":"ceph: fix deadlock or deadcode of misusing dget()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix deadlock or deadcode of misusing dget()\n\nThe lock order is incorrect between denty and its parent, we should\nalways make sure that the parent get the lock first.\n\nBut since this deadcode is never used and the parent dir will always\nbe set from the callers, let's just remove it.","modified":"2026-04-02T09:43:03.901533Z","published":"2024-03-06T06:45:19.319Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1454-1","SUSE-SU-2024:1465-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1489-1","SUSE-SU-2024:1490-1","SUSE-SU-2024:1643-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1870-1","USN-6818-2","USN-6819-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52583.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980"},{"type":"WEB","url":"https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52583.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52583"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9030aaf9bf0a1eee47a154c316c789e959638b0f"},{"fixed":"eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6"},{"fixed":"6ab4fd508fad942f1f1ba940492f2735e078e980"},{"fixed":"e016e358461b89b231626fcf78c5c38e35c44fd3"},{"fixed":"a9c15d6e8aee074fae66c04d114f20b84274fcca"},{"fixed":"7f2649c94264d00df6b6ac27161e9f4372a3450e"},{"fixed":"196b87e5c00ce021e164a5de0f0d04f4116a9160"},{"fixed":"76cb2aa3421fee4fde706dec41b1344bc0a9ad67"},{"fixed":"b493ad718b1f0357394d2cdecbf00a44a36fa085"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52583.json"}}],"schema_version":"1.7.5"}