{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54119","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T13:02:52.520Z","datePublished":"2025-12-24T13:06:39.692Z","dateUpdated":"2026-05-11T19:55:50.727Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:55:50.727Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ninotify: Avoid reporting event with invalid wd\n\nWhen inotify_freeing_mark() races with inotify_handle_inode_event() it\ncan happen that inotify_handle_inode_event() sees that i_mark->wd got\nalready reset to -1 and reports this value to userspace which can\nconfuse the inotify listener. Avoid the problem by validating that wd is\nsensible (and pretend the mark got removed before the event got\ngenerated otherwise)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/notify/inotify/inotify_fsnotify.c"],"versions":[{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"8fb33166aed888769ea63d6af49515893f8a1f14","status":"affected","versionType":"git"},{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"2d65c97777e5b4a845637800d5d7b648f5772106","status":"affected","versionType":"git"},{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"17ad86d8c12220de97e80d88b5b4c934a40e1812","status":"affected","versionType":"git"},{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"145f54ea336b06cf4f92eeee996f2ffca939ea43","status":"affected","versionType":"git"},{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"fb3294998489d39835006240e9c6e6b2ac62022e","status":"affected","versionType":"git"},{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"a48bacee05860c6089c3482bcdc80720b0ee5732","status":"affected","versionType":"git"},{"version":"7e790dd5fc937bc8d2400c30a05e32a9e9eef276","lessThan":"c915d8f5918bea7c3962b09b8884ca128bfd9b0c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/notify/inotify/inotify_fsnotify.c"],"versions":[{"version":"2.6.31","status":"affected"},{"version":"0","lessThan":"2.6.31","status":"unaffected","versionType":"semver"},{"version":"5.4.243","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.180","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.112","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.29","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.16","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3.3","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.4.243"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.10.180"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"5.15.112"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.1.29"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.2.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.3.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"6.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8fb33166aed888769ea63d6af49515893f8a1f14"},{"url":"https://git.kernel.org/stable/c/2d65c97777e5b4a845637800d5d7b648f5772106"},{"url":"https://git.kernel.org/stable/c/17ad86d8c12220de97e80d88b5b4c934a40e1812"},{"url":"https://git.kernel.org/stable/c/145f54ea336b06cf4f92eeee996f2ffca939ea43"},{"url":"https://git.kernel.org/stable/c/fb3294998489d39835006240e9c6e6b2ac62022e"},{"url":"https://git.kernel.org/stable/c/a48bacee05860c6089c3482bcdc80720b0ee5732"},{"url":"https://git.kernel.org/stable/c/c915d8f5918bea7c3962b09b8884ca128bfd9b0c"}],"title":"inotify: Avoid reporting event with invalid wd","x_generator":{"engine":"bippy-1.2.0"}}}}