CVE-2023-53396
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/09/2025
Last modified:
19/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ubifs: Fix memory leak in do_rename<br />
<br />
If renaming a file in an encrypted directory, function<br />
fscrypt_setup_filename allocates memory for a file name. This name is<br />
never used, and before returning to the caller the memory for it is not<br />
freed.<br />
<br />
When running kmemleak on it we see that it is registered as a leak. The<br />
report below is triggered by a simple program &#39;rename&#39; that renames a<br />
file in an encrypted directory:<br />
<br />
unreferenced object 0xffff888101502840 (size 32):<br />
comm "rename", pid 9404, jiffies 4302582475 (age 435.735s)<br />
backtrace:<br />
__kmem_cache_alloc_node<br />
__kmalloc<br />
fscrypt_setup_filename<br />
do_rename<br />
ubifs_rename<br />
vfs_rename<br />
do_renameat2<br />
<br />
To fix this we can remove the call to fscrypt_setup_filename as it&#39;s not<br />
needed.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3a36d20e012903f45714df2731261fdefac900cb
- https://git.kernel.org/stable/c/43b2f7d690697182beed6f71aa57b7249d3cfc9c
- https://git.kernel.org/stable/c/517ddc0259d7a7231486bdafde8035c478bc4088
- https://git.kernel.org/stable/c/7e264f67b7d6580eff5c2696961039fd05c69258
- https://git.kernel.org/stable/c/9f565752b328fe53c9e42b7d4e4d89a1da63d738