{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54192","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:44.498Z","datePublished":"2025-12-30T12:08:59.989Z","dateUpdated":"2026-05-11T19:57:14.965Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:57:14.965Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix null pointer panic in tracepoint in __replace_atomic_write_block\n\nWe got a kernel panic if old_addr is NULL.\n\nhttps://bugzilla.kernel.org/show_bug.cgi?id=217266\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n Call Trace:\n  <TASK>\n  f2fs_commit_atomic_write+0x619/0x990 [f2fs a1b985b80f5babd6f3ea778384908880812bfa43]\n  __f2fs_ioctl+0xd8e/0x4080 [f2fs a1b985b80f5babd6f3ea778384908880812bfa43]\n  ? vfs_write+0x2ae/0x3f0\n  ? vfs_write+0x2ae/0x3f0\n  __x64_sys_ioctl+0x91/0xd0\n  do_syscall_64+0x5c/0x90\n  entry_SYSCALL_64_after_hwframe+0x72/0xdc\n RIP: 0033:0x7f69095fe53f"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/f2fs/segment.c"],"versions":[{"version":"9ad51915f4b368eef8f4cbd3a0b6367d4504c245","lessThan":"424f8cdc0ad29e4940be96dcc0b935ba497adeda","status":"affected","versionType":"git"},{"version":"f955d66b179679312310d42108c0df1cd0714313","lessThan":"1424358cd66c49460493293497b54cb72e0213cc","status":"affected","versionType":"git"},{"version":"2f3a9ae990a7881c9a57a073bb52ebe34fdc3160","lessThan":"e2bbefc1741cb0732c13652be173da02f25611d1","status":"affected","versionType":"git"},{"version":"2f3a9ae990a7881c9a57a073bb52ebe34fdc3160","lessThan":"da6ea0b050fa720302b56fbb59307e7c7531a342","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/f2fs/segment.c"],"versions":[{"version":"6.3","status":"affected"},{"version":"0","lessThan":"6.3","status":"unaffected","versionType":"semver"},{"version":"6.1.29","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.16","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3.3","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.18","versionEndExcluding":"6.1.29"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.5","versionEndExcluding":"6.2.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3","versionEndExcluding":"6.3.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3","versionEndExcluding":"6.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/424f8cdc0ad29e4940be96dcc0b935ba497adeda"},{"url":"https://git.kernel.org/stable/c/1424358cd66c49460493293497b54cb72e0213cc"},{"url":"https://git.kernel.org/stable/c/e2bbefc1741cb0732c13652be173da02f25611d1"},{"url":"https://git.kernel.org/stable/c/da6ea0b050fa720302b56fbb59307e7c7531a342"}],"title":"f2fs: fix null pointer panic in tracepoint in __replace_atomic_write_block","x_generator":{"engine":"bippy-1.2.0"}}}}