-

CVE-2023-54140

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse

A syzbot stress test using a corrupted disk image reported that
mark_buffer_dirty() called from __nilfs_mark_inode_dirty() or
nilfs_palloc_commit_alloc_entry() may output a kernel warning, and can
panic if the kernel is booted with panic_on_warn.

This is because nilfs2 keeps buffer pointers in local structures for some
metadata and reuses them, but such buffers may be forcibly discarded by
nilfs_clear_dirty_page() in some critical situations.

This issue is reported to appear after commit 28a65b49eb53 ("nilfs2: do
not write dirty data after degenerating to read-only"), but the issue has
potentially existed before.

Fix this issue by checking the uptodate flag when attempting to reuse an
internally held buffer, and reloading the metadata instead of reusing the
buffer if the flag was lost.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 473795610594f261e98920f0945550314df36f07
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < d95e403588738c7ec38f52b9f490b15e7745d393
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < 99a73016a5e12a09586a96f998e91f9ea145cd00
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < f1d637b63d8a27ac3386f186a694907f2717fc13
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < b911bef132a06de01a745c6a24172d6db7216333
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < 4da07e958bfda2d69d83db105780e8916e3ac02e
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < 46c11be2dca295742a5508ea910a77f7733fb7f4
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < b308b3eabc429649b5501d36290cea403fbd746c
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
Version < cdaac8e7e5a059f9b5e816cda257f08d0abffacd
Version 8c26c4e2694a163d525976e804d81cd955bbb40c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.10
Status affected
Version < 3.10
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.131
Status unaffected
Version <= 6.1.*
Version 6.1.52
Status unaffected
Version <= 6.4.*
Version 6.4.15
Status unaffected
Version <= 6.5.*
Version 6.5.2
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.146
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.