VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54192

CVE-2023-54192

Description

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix null pointer panic in tracepoint in __replace_atomic_write_block

We got a kernel panic if old_addr is NULL.

https://bugzilla.kernel.org/show_bug.cgi?id=217266

BUG: kernel NULL pointer dereference, address: 0000000000000000 Call Trace:

f2fs_commit_atomic_write+0x619/0x990 [f2fs a1b985b80f5babd6f3ea778384908880812bfa43] __f2fs_ioctl+0xd8e/0x4080 [f2fs a1b985b80f5babd6f3ea778384908880812bfa43] ? vfs_write+0x2ae/0x3f0 ? vfs_write+0x2ae/0x3f0 __x64_sys_ioctl+0x91/0xd0 do_syscall_64+0x5c/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f69095fe53f

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in the Linux kernel's f2fs filesystem tracepoint during atomic write operations can lead to a kernel panic.

Vulnerability

Analysis

CVE-2023-54192 is a null pointer dereference vulnerability in the Linux kernel's f2fs (Flash-Friendly File System) filesystem. The bug resides in the tracepoint used in the __replace_atomic_write_block function, where a pointer (old_addr) can be NULL when passed to the tracepoint macro. The commit description confirms that a panic occurred due to a NULL pointer dereference at address 0x0000000000000000, triggered during f2fs_commit_atomic_write [1].

Exploitation

The vulnerability is triggered during the commit of an atomic write operation via the f2fs_commit_atomic_write function, which is called from the __f2fs_ioctl handler. An attacker with local access and the ability to mount an f2fs filesystem and perform atomic write operations (via the F2FS_IOC_START_ATOMIC_WRITE and F2FS_IOC_COMMIT_ATOMIC_WRITE ioctls) can exploit this bug. No special privileges beyond normal filesystem access are required, as the ioctl is available to unprivileged users with write access to the filesystem. The crash occurs when the tracepoint attempts to dereference the NULL old_addr pointer, leading to a kernel panic [1].

Impact

Successful exploitation results in a denial of service (DoS) by causing a system crash (kernel panic). This can disrupt services and require a system reboot. The vulnerability does not appear to lead to privilege escalation or arbitrary code execution, as it is a null pointer dereference in a tracepoint, which is typically read-only and does not control execution flow beyond the crash [1].

Mitigation

The fix was included in Linux kernel stable releases. The commit (424f8cdc0ad2) checks for NULL old_addr before passing it to the tracepoint, preventing the dereference. Users should update their kernels to include this patch. The referenced stable kernel commit ensures the fix is backported to affected stable branches. No workaround is known other than applying the patch or disabling f2fs atomic write operations if possible [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.