{"id":"CVE-2023-53845","summary":"nilfs2: fix infinite loop in nilfs_mdt_get_block()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix infinite loop in nilfs_mdt_get_block()\n\nIf the disk image that nilfs2 mounts is corrupted and a virtual block\naddress obtained by block lookup for a metadata file is invalid,\nnilfs_bmap_lookup_at_level() may return the same internal return code as\n-ENOENT, meaning the block does not exist in the metadata file.\n\nThis duplication of return codes confuses nilfs_mdt_get_block(), causing\nit to read and create a metadata block indefinitely.\n\nIn particular, if this happens to the inode metadata file, ifile,\nsemaphore i_rwsem can be left held, causing task hangs in lock_mount.\n\nFix this issue by making nilfs_bmap_lookup_at_level() treat virtual block\naddress translation failures with -ENOENT as metadata corruption instead\nof returning the error code.","modified":"2026-03-20T12:33:22.257053Z","published":"2025-12-09T01:30:08.016Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53845.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/25457d07c8146e57d28906c663def033dc425af6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/34c5f17222b50c79848bb03ec8811648813e6a45"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5b29661669cb65b9750a3cf70ed3eaf947b92167"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a89d36a07afe1ed4564df51fefa2bb556c85412"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d07d9119642ba43d21f8ba64d51d01931096b20"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6a491c048882e7e424d407d32cba0b52d9ef2bf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cfb0bb4fbd40c1f06da7e9f88c0a2d46155b90c2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d536f9976bb04e9c84cf80045a9355975e418f41"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fe1cbbcb1a2532ee1654e1ff121be8906d83c6f0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53845.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53845"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bdb265eae08db578e7cf5739be16f389d495fc75"},{"fixed":"cfb0bb4fbd40c1f06da7e9f88c0a2d46155b90c2"},{"fixed":"d536f9976bb04e9c84cf80045a9355975e418f41"},{"fixed":"fe1cbbcb1a2532ee1654e1ff121be8906d83c6f0"},{"fixed":"8a89d36a07afe1ed4564df51fefa2bb556c85412"},{"fixed":"8d07d9119642ba43d21f8ba64d51d01931096b20"},{"fixed":"25457d07c8146e57d28906c663def033dc425af6"},{"fixed":"34c5f17222b50c79848bb03ec8811648813e6a45"},{"fixed":"5b29661669cb65b9750a3cf70ed3eaf947b92167"},{"fixed":"a6a491c048882e7e424d407d32cba0b52d9ef2bf"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53845.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.30"},{"fixed":"4.14.315"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.283"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.243"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.180"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.111"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.28"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.15"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.3.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53845.json"}}],"schema_version":"1.7.5"}