ghsa-wgxf-ch55-cw7h
Vulnerability from github
Published
2025-12-24 15:30
Modified
2025-12-24 15:30
VLAI Severity ?
Details
In the Linux kernel, the following vulnerability has been resolved:
inotify: Avoid reporting event with invalid wd
When inotify_freeing_mark() races with inotify_handle_inode_event() it can happen that inotify_handle_inode_event() sees that i_mark->wd got already reset to -1 and reports this value to userspace which can confuse the inotify listener. Avoid the problem by validating that wd is sensible (and pretend the mark got removed before the event got generated otherwise).
{
"affected": [],
"aliases": [
"CVE-2023-54119"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-12-24T13:16:13Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ninotify: Avoid reporting event with invalid wd\n\nWhen inotify_freeing_mark() races with inotify_handle_inode_event() it\ncan happen that inotify_handle_inode_event() sees that i_mark-\u003ewd got\nalready reset to -1 and reports this value to userspace which can\nconfuse the inotify listener. Avoid the problem by validating that wd is\nsensible (and pretend the mark got removed before the event got\ngenerated otherwise).",
"id": "GHSA-wgxf-ch55-cw7h",
"modified": "2025-12-24T15:30:38Z",
"published": "2025-12-24T15:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-54119"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/145f54ea336b06cf4f92eeee996f2ffca939ea43"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/17ad86d8c12220de97e80d88b5b4c934a40e1812"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2d65c97777e5b4a845637800d5d7b648f5772106"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8fb33166aed888769ea63d6af49515893f8a1f14"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a48bacee05860c6089c3482bcdc80720b0ee5732"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c915d8f5918bea7c3962b09b8884ca128bfd9b0c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/fb3294998489d39835006240e9c6e6b2ac62022e"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…