VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53845

CVE-2023-53845

Description

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix infinite loop in nilfs_mdt_get_block()

If the disk image that nilfs2 mounts is corrupted and a virtual block address obtained by block lookup for a metadata file is invalid, nilfs_bmap_lookup_at_level() may return the same internal return code as -ENOENT, meaning the block does not exist in the metadata file.

This duplication of return codes confuses nilfs_mdt_get_block(), causing it to read and create a metadata block indefinitely.

In particular, if this happens to the inode metadata file, ifile, semaphore i_rwsem can be left held, causing task hangs in lock_mount.

Fix this issue by making nilfs_bmap_lookup_at_level() treat virtual block address translation failures with -ENOENT as metadata corruption instead of returning the error code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's nilfs2 filesystem, a corrupted disk image can cause an infinite loop in nilfs_mdt_get_block(), leading to system hangs.

Vulnerability

Description

CVE-2023-53845 is a vulnerability in the Linux kernel's nilfs2 filesystem. When a corrupted disk image is mounted, nilfs_bmap_lookup_at_level() may erroneously return -ENOENT, confusing nilfs_mdt_get_block() into reading and creating a metadata block indefinitely, resulting in an infinite loop [1].

Attack

Surface

An attacker must supply a corrupted nilfs2 filesystem image that triggers the invalid block lookup. Mounting such an image requires no special privileges beyond the ability to mount a filesystem; however, the attacker must have control over the storage medium or a means to inject the malicious image.

Impact

The infinite loop causes the inode metadata file (ifile) to hold the i_rwsem semaphore indefinitely, leading to task hangs in lock_mount and ultimately system unresponsiveness. This constitutes a denial-of-service (DoS) condition.

Mitigation

Patches have been applied to the Linux kernel stable branches [1][2]. The fix modifies nilfs_bmap_lookup_at_level() to treat -ENOENT from virtual block address translation as metadata corruption rather than propagating the error code, thereby breaking the infinite loop.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.