{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54177","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:44.496Z","datePublished":"2025-12-30T12:08:49.588Z","dateUpdated":"2026-05-11T19:56:56.408Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:56:56.408Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nquota: fix warning in dqgrab()\n\nThere's issue as follows when do fault injection:\nWARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0\nModules linked in:\nCPU: 1 PID: 14870 Comm: fsconfig Not tainted 6.3.0-next-20230505-00006-g5107a9c821af-dirty #541\nRIP: 0010:dquot_disable+0x13b7/0x18c0\nRSP: 0018:ffffc9000acc79e0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88825e41b980\nRDX: 0000000000000000 RSI: ffff88825e41b980 RDI: 0000000000000002\nRBP: ffff888179f68000 R08: ffffffff82087ca7 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffed102f3ed026 R12: ffff888179f68130\nR13: ffff888179f68110 R14: dffffc0000000000 R15: ffff888179f68118\nFS:  00007f450a073740(0000) GS:ffff88882fc00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe96f2efd8 CR3: 000000025c8ad000 CR4: 00000000000006e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n dquot_load_quota_sb+0xd53/0x1060\n dquot_resume+0x172/0x230\n ext4_reconfigure+0x1dc6/0x27b0\n reconfigure_super+0x515/0xa90\n __x64_sys_fsconfig+0xb19/0xd20\n do_syscall_64+0x39/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAbove issue may happens as follows:\nProcessA              ProcessB                    ProcessC\nsys_fsconfig\n  vfs_fsconfig_locked\n   reconfigure_super\n     ext4_remount\n      dquot_suspend -> suspend all type quota\n\n                 sys_fsconfig\n                  vfs_fsconfig_locked\n                    reconfigure_super\n                     ext4_remount\n                      dquot_resume\n                       ret = dquot_load_quota_sb\n                        add_dquot_ref\n                                           do_open  -> open file O_RDWR\n                                            vfs_open\n                                             do_dentry_open\n                                              get_write_access\n                                               atomic_inc_unless_negative(&inode->i_writecount)\n                                              ext4_file_open\n                                               dquot_file_open\n                                                dquot_initialize\n                                                  __dquot_initialize\n                                                   dqget\n\t\t\t\t\t\t    atomic_inc(&dquot->dq_count);\n\n                          __dquot_initialize\n                           __dquot_initialize\n                            dqget\n                             if (!test_bit(DQ_ACTIVE_B, &dquot->dq_flags))\n                               ext4_acquire_dquot\n\t\t\t        -> Return error DQ_ACTIVE_B flag isn't set\n                         dquot_disable\n\t\t\t  invalidate_dquots\n\t\t\t   if (atomic_read(&dquot->dq_count))\n\t                    dqgrab\n\t\t\t     WARN_ON_ONCE(!test_bit(DQ_ACTIVE_B, &dquot->dq_flags))\n\t                      -> Trigger warning\n\nIn the above scenario, 'dquot->dq_flags' has no DQ_ACTIVE_B is normal when\ndqgrab().\nTo solve above issue just replace the dqgrab() use in invalidate_dquots() with\natomic_inc(&dquot->dq_count)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/quota/dquot.c"],"versions":[{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"6478eabc92274efae6269da7c515ba2b4c8e88d8","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"965bad2bf1afef64ec16249da676dc7310cca32e","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"3f378783c47b5749317ea008d8c931d6d3986d8f","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"cbaebbba722cb9738c55903efce11f51cdd97bee","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"579d814de87c3cac69c9b261efa165d07cde3357","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"6432843debe1ec7d76c5b2f76c67f9c5df22436e","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"6f4e543d277a12dfeff027e6ab24a170e1bfc160","status":"affected","versionType":"git"},{"version":"9f985cb6c45bc3f8b7e161c9658d409d051d576f","lessThan":"d6a95db3c7ad160bc16b89e36449705309b52bcb","status":"affected","versionType":"git"},{"version":"b5258061a2a8f657aa5900dd3c1ded9e868e3544","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/quota/dquot.c"],"versions":[{"version":"3.15","status":"affected"},{"version":"0","lessThan":"3.15","status":"unaffected","versionType":"semver"},{"version":"4.14.324","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.293","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.255","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.192","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.123","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.42","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.4.7","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"4.14.324"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"4.19.293"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"5.4.255"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"5.10.192"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"5.15.123"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"6.1.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"6.4.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.15","versionEndExcluding":"6.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12.24"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6478eabc92274efae6269da7c515ba2b4c8e88d8"},{"url":"https://git.kernel.org/stable/c/965bad2bf1afef64ec16249da676dc7310cca32e"},{"url":"https://git.kernel.org/stable/c/3f378783c47b5749317ea008d8c931d6d3986d8f"},{"url":"https://git.kernel.org/stable/c/cbaebbba722cb9738c55903efce11f51cdd97bee"},{"url":"https://git.kernel.org/stable/c/579d814de87c3cac69c9b261efa165d07cde3357"},{"url":"https://git.kernel.org/stable/c/6432843debe1ec7d76c5b2f76c67f9c5df22436e"},{"url":"https://git.kernel.org/stable/c/6f4e543d277a12dfeff027e6ab24a170e1bfc160"},{"url":"https://git.kernel.org/stable/c/d6a95db3c7ad160bc16b89e36449705309b52bcb"}],"title":"quota: fix warning in dqgrab()","x_generator":{"engine":"bippy-1.2.0"}}}}