Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54194

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
31/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree<br /> <br /> The call stack shown below is a scenario in the Linux 4.19 kernel.<br /> Allocating memory failed where exfat fs use kmalloc_array due to<br /> system memory fragmentation, while the u-disk was inserted without<br /> recognition.<br /> Devices such as u-disk using the exfat file system are pluggable and<br /> may be insert into the system at any time.<br /> However, long-term running systems cannot guarantee the continuity of<br /> physical memory. Therefore, it&amp;#39;s necessary to address this issue.<br /> <br /> Binder:2632_6: page allocation failure: order:4,<br /> mode:0x6040c0(GFP_KERNEL|__GFP_COMP), nodemask=(null)<br /> Call trace:<br /> [242178.097582] dump_backtrace+0x0/0x4<br /> [242178.097589] dump_stack+0xf4/0x134<br /> [242178.097598] warn_alloc+0xd8/0x144<br /> [242178.097603] __alloc_pages_nodemask+0x1364/0x1384<br /> [242178.097608] kmalloc_order+0x2c/0x510<br /> [242178.097612] kmalloc_order_trace+0x40/0x16c<br /> [242178.097618] __kmalloc+0x360/0x408<br /> [242178.097624] load_alloc_bitmap+0x160/0x284<br /> [242178.097628] exfat_fill_super+0xa3c/0xe7c<br /> [242178.097635] mount_bdev+0x2e8/0x3a0<br /> [242178.097638] exfat_fs_mount+0x40/0x50<br /> [242178.097643] mount_fs+0x138/0x2e8<br /> [242178.097649] vfs_kern_mount+0x90/0x270<br /> [242178.097655] do_mount+0x798/0x173c<br /> [242178.097659] ksys_mount+0x114/0x1ac<br /> [242178.097665] __arm64_sys_mount+0x24/0x34<br /> [242178.097671] el0_svc_common+0xb8/0x1b8<br /> [242178.097676] el0_svc_handler+0x74/0x90<br /> [242178.097681] el0_svc+0x8/0x340<br /> <br /> By analyzing the exfat code,we found that continuous physical memory<br /> is not required here,so kvmalloc_array is used can solve this problem.

Impacto