CVE-2023-54124Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to drop all dirty pages during umount() if cp_error is set xfstest generic/361 reports a bug as below: f2fs_bug_on(sbi, sbi->fsync_node_num); kernel BUG at fs/f2fs/super.c:1627! RIP: 0010:f2fs_put_super+0x3a8/0x3b0 Call Trace: generic_shutdown_super+0x8c/0x1b0 kill_block_super+0x2b/0x60 kill_f2fs_super+0x87/0x110 deactivate_locked_super+0x39/0x80 deactivate_super+0x46/0x50 cleanup_mnt+0x109/0x170 __cleanup_mnt+0x16

Affected Packages4 packages

Linuxlinux/linux_kernel4.19.04.19.284+5
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxaf697c0f5c5b8798832e651baf23460d588393de92575f05a32dafb16348bfa5e62478118a9be069+7
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
f2fs: fix to drop all dirty pages during umount() if cp_error is set2025-12-24
GHSA
GHSA-f6pj-88hq-4vr4: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to drop all dirty pages during umount() if cp_error is set xfstest gen2025-12-24
OSV
CVE-2023-54124: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to drop all dirty pages during umount() if cp_error is set xfstest gener2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: f2fs: fix to drop all dirty pages during umount() if cp_error is set2025-12-24
Debian
CVE-2023-54124: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54124 Impact, Exploitability, and Mitigation Steps | Wiz