DEBIAN-CVE-2023-54194

Source
https://security-tracker.debian.org/tracker/CVE-2023-54194
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54194.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-54194
Upstream
Published
2025-12-30T13:16:07.437Z
Modified
2025-12-31T11:20:50.498343Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: exfat: use kvmallocarray/kvfree instead of kmallocarray/kfree The call stack shown below is a scenario in the Linux 4.19 kernel. Allocating memory failed where exfat fs use kmallocarray due to system memory fragmentation, while the u-disk was inserted without recognition. Devices such as u-disk using the exfat file system are pluggable and may be insert into the system at any time. However, long-term running systems cannot guarantee the continuity of physical memory. Therefore, it's necessary to address this issue. Binder:26326: page allocation failure: order:4, mode:0x6040c0(GFPKERNEL|GFPCOMP), nodemask=(null) Call trace: [242178.097582] dumpbacktrace+0x0/0x4 [242178.097589] dumpstack+0xf4/0x134 [242178.097598] warnalloc+0xd8/0x144 [242178.097603] _allocpagesnodemask+0x1364/0x1384 [242178.097608] kmallocorder+0x2c/0x510 [242178.097612] kmallocordertrace+0x40/0x16c [242178.097618] _kmalloc+0x360/0x408 [242178.097624] loadallocbitmap+0x160/0x284 [242178.097628] exfatfillsuper+0xa3c/0xe7c [242178.097635] mountbdev+0x2e8/0x3a0 [242178.097638] exfatfsmount+0x40/0x50 [242178.097643] mountfs+0x138/0x2e8 [242178.097649] vfskernmount+0x90/0x270 [242178.097655] domount+0x798/0x173c [242178.097659] ksysmount+0x114/0x1ac [242178.097665] _arm64sysmount+0x24/0x34 [242178.097671] el0svccommon+0xb8/0x1b8 [242178.097676] el0svchandler+0x74/0x90 [242178.097681] el0svc+0x8/0x340 By analyzing the exfat code,we found that continuous physical memory is not required here,so kvmalloc_array is used can solve this problem.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.191-1

Affected versions

5.*
5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1
5.10.178-1
5.10.178-2
5.10.178-3
5.10.179-1
5.10.179-2
5.10.179-3
5.10.179-4
5.10.179-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54194.json"

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.52-1

Affected versions

6.*
6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54194.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54194.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54194.json"