CVE-2023-54151
Use-After-Free in Linux Kernel f2fs Causes System Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the f2fs system crash issue caused by lack of free space during checkpoint in LFS mode. This patch adds checks for sufficient free sections before checkpointing during garbage collection, preventing the crash.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's f2fs filesystem when operating in LFS (Log-structured File System) mode. During a checkpoint operation triggered by foreground garbage collection, if the amount of dirty node and dentry pages generated by data migration exceeds the available free space, the system crashes. Essentially, the system does not properly check if there is enough free space before performing the checkpoint, leading to a crash.
How can this vulnerability impact me? :
This vulnerability can cause a system crash when using the f2fs filesystem in LFS mode under certain conditions involving heavy data migration and insufficient free space. Such crashes can lead to system instability, potential data loss, and service interruptions.