CVE-2023-54127
Double-Free Vulnerability in Linux JFS Filesystem Causes Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for KASAN (Kernel Address Sanitizer) double-free warnings related to the JFS filesystem, specifically messages indicating double-free in slab_free or __kmem_cache_free functions. Using kernel debugging tools like KASAN and reproducing the issue with fault injection (as done by Syzkaller) can help detect it. There are no specific commands provided in the context to detect this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The context does not provide specific immediate mitigation steps. However, since the issue is fixed in the Linux kernel by preventing double-free in dbUnmount() after failed jfs_remount(), the recommended mitigation is to update the Linux kernel to a version that includes this fix.
Can you explain this vulnerability to me?
This vulnerability is a double-free bug in the Linux kernel's JFS filesystem code, specifically in the dbUnmount() function after a failed jfs_remount(). When certain mount or remount operations fail, the code attempts to free the same memory twice because a pointer (JFS_SBI(ipbmap->i_sb)->bmap) was not set to NULL after being freed. This leads to a double-free condition detected by KASAN (Kernel Address Sanitizer), which can cause kernel instability or crashes.
How can this vulnerability impact me? :
This double-free vulnerability can lead to kernel crashes or instability, potentially causing denial of service on affected systems. Since it involves memory management errors in the kernel, it could be exploited to disrupt normal system operations or cause unexpected behavior in the filesystem handling.