CVE-2023-54194
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/12/2025
Last modified:
31/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree<br />
<br />
The call stack shown below is a scenario in the Linux 4.19 kernel.<br />
Allocating memory failed where exfat fs use kmalloc_array due to<br />
system memory fragmentation, while the u-disk was inserted without<br />
recognition.<br />
Devices such as u-disk using the exfat file system are pluggable and<br />
may be insert into the system at any time.<br />
However, long-term running systems cannot guarantee the continuity of<br />
physical memory. Therefore, it&#39;s necessary to address this issue.<br />
<br />
Binder:2632_6: page allocation failure: order:4,<br />
mode:0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)<br />
Call trace:<br />
[242178.097582] dump_backtrace+0x0/0x4<br />
[242178.097589] dump_stack+0xf4/0x134<br />
[242178.097598] warn_alloc+0xd8/0x144<br />
[242178.097603] __alloc_pages_nodemask+0x1364/0x1384<br />
[242178.097608] kmalloc_order+0x2c/0x510<br />
[242178.097612] kmalloc_order_trace+0x40/0x16c<br />
[242178.097618] __kmalloc+0x360/0x408<br />
[242178.097624] load_alloc_bitmap+0x160/0x284<br />
[242178.097628] exfat_fill_super+0xa3c/0xe7c<br />
[242178.097635] mount_bdev+0x2e8/0x3a0<br />
[242178.097638] exfat_fs_mount+0x40/0x50<br />
[242178.097643] mount_fs+0x138/0x2e8<br />
[242178.097649] vfs_kern_mount+0x90/0x270<br />
[242178.097655] do_mount+0x798/0x173c<br />
[242178.097659] ksys_mount+0x114/0x1ac<br />
[242178.097665] __arm64_sys_mount+0x24/0x34<br />
[242178.097671] el0_svc_common+0xb8/0x1b8<br />
[242178.097676] el0_svc_handler+0x74/0x90<br />
[242178.097681] el0_svc+0x8/0x340<br />
<br />
By analyzing the exfat code,we found that continuous physical memory<br />
is not required here,so kvmalloc_array is used can solve this problem.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c5c3e8a2550b6b2a304b45f260296db9c09df96
- https://git.kernel.org/stable/c/1427a7e96fb90d0896f74f5bcd21feb03cc7c3d0
- https://git.kernel.org/stable/c/79d16a84ea41272dfcb0c00f9798ddd0edd8098d
- https://git.kernel.org/stable/c/8a34a242cf03211cc89f68308d149b793f63c479
- https://git.kernel.org/stable/c/daf60d6cca26e50d65dac374db92e58de745ad26



