U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-53804 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() During unmount process of nilfs2, nothing holds nilfs_root structure after nilfs2 detaches its writer in nilfs_detach_log_writer(). However, since nilfs_evict_inode() uses nilfs_root for some cleanup operations, it may cause use-after-free read if inodes are left in "garbage_list" and released by nilfs_dispose_list() at the end of nilfs_detach_log_writer(). Fix this issue by modifying nilfs_evict_inode() to only clear inode without additional metadata changes that use nilfs_root if the file system is degraded to read-only or the writer is detached.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/116d53f09ff52e6f98e3fe1f85d8898d6ba26c68 kernel.org
https://git.kernel.org/stable/c/2a782ea8ebd712a458466e3103e2881b4f886cb5 kernel.org
https://git.kernel.org/stable/c/6b4205ea97901f822004e6c8d59484ccfda03faa kernel.org
https://git.kernel.org/stable/c/9b5a04ac3ad9898c4745cba46ea26de74ba56a8e kernel.org
https://git.kernel.org/stable/c/acc2a40e428f12780004e1e9fce4722d88f909fd kernel.org
https://git.kernel.org/stable/c/b8427b8522d9ede53015ba45a9978ba68d1162f5 kernel.org
https://git.kernel.org/stable/c/f31e18131ee2ce80a4da5c808221d25b1ae9ad6d kernel.org
https://git.kernel.org/stable/c/fb8e8d58f116d069e5939e1f786ac84e7fa4533e kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-53804
NVD Published Date:
12/08/2025
NVD Last Modified:
12/09/2025
Source:
kernel.org