U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-54140 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse A syzbot stress test using a corrupted disk image reported that mark_buffer_dirty() called from __nilfs_mark_inode_dirty() or nilfs_palloc_commit_alloc_entry() may output a kernel warning, and can panic if the kernel is booted with panic_on_warn. This is because nilfs2 keeps buffer pointers in local structures for some metadata and reuses them, but such buffers may be forcibly discarded by nilfs_clear_dirty_page() in some critical situations. This issue is reported to appear after commit 28a65b49eb53 ("nilfs2: do not write dirty data after degenerating to read-only"), but the issue has potentially existed before. Fix this issue by checking the uptodate flag when attempting to reuse an internally held buffer, and reloading the metadata instead of reusing the buffer if the flag was lost.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/46c11be2dca295742a5508ea910a77f7733fb7f4 kernel.org
https://git.kernel.org/stable/c/473795610594f261e98920f0945550314df36f07 kernel.org
https://git.kernel.org/stable/c/4da07e958bfda2d69d83db105780e8916e3ac02e kernel.org
https://git.kernel.org/stable/c/99a73016a5e12a09586a96f998e91f9ea145cd00 kernel.org
https://git.kernel.org/stable/c/b308b3eabc429649b5501d36290cea403fbd746c kernel.org
https://git.kernel.org/stable/c/b911bef132a06de01a745c6a24172d6db7216333 kernel.org
https://git.kernel.org/stable/c/cdaac8e7e5a059f9b5e816cda257f08d0abffacd kernel.org
https://git.kernel.org/stable/c/d95e403588738c7ec38f52b9f490b15e7745d393 kernel.org
https://git.kernel.org/stable/c/f1d637b63d8a27ac3386f186a694907f2717fc13 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-54140
NVD Published Date:
12/24/2025
NVD Last Modified:
12/24/2025
Source:
kernel.org