CVE-2023-53468
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
20/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ubifs: Fix memory leak in alloc_wbufs()<br />
<br />
kmemleak reported a sequence of memory leaks, and show them as following:<br />
<br />
unreferenced object 0xffff8881575f8400 (size 1024):<br />
comm "mount", pid 19625, jiffies 4297119604 (age 20.383s)<br />
hex dump (first 32 bytes):<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />
backtrace:<br />
[] __kmalloc+0x4d/0x150<br />
[] ubifs_mount+0x307b/0x7170 [ubifs]<br />
[] legacy_get_tree+0xed/0x1d0<br />
[] vfs_get_tree+0x7d/0x230<br />
[] path_mount+0xdd4/0x17b0<br />
[] __x64_sys_mount+0x1fa/0x270<br />
[] do_syscall_64+0x35/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
unreferenced object 0xffff8881798a6e00 (size 512):<br />
comm "mount", pid 19677, jiffies 4297121912 (age 37.816s)<br />
hex dump (first 32 bytes):<br />
6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk<br />
6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk<br />
backtrace:<br />
[] __kmalloc+0x4d/0x150<br />
[] ubifs_wbuf_init+0x52/0x480 [ubifs]<br />
[] ubifs_mount+0x31f5/0x7170 [ubifs]<br />
[] legacy_get_tree+0xed/0x1d0<br />
[] vfs_get_tree+0x7d/0x230<br />
[] path_mount+0xdd4/0x17b0<br />
[] __x64_sys_mount+0x1fa/0x270<br />
[] do_syscall_64+0x35/0x80<br />
[] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
The problem is that the ubifs_wbuf_init() returns an error in the<br />
loop which in the alloc_wbufs(), then the wbuf->buf and wbuf->inodes<br />
that were successfully alloced before are not freed.<br />
<br />
Fix it by adding error hanging path in alloc_wbufs() which frees<br />
the memory alloced before when ubifs_wbuf_init() returns an error.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.27 (including) | 5.4.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.173 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1f206002c6bc302bface871ef3f72c0bbcaa931c
- https://git.kernel.org/stable/c/26ec45f1c504e15268383019df139d7983f1e67f
- https://git.kernel.org/stable/c/3e29634eb56e6547272fe4e568f63421f8b3b9fa
- https://git.kernel.org/stable/c/4a1ff3c5d04b9079b4f768d9a71b51c4af578dd2
- https://git.kernel.org/stable/c/bf50229494f0443b3f08427d7df63e5a7e2a796a
- https://git.kernel.org/stable/c/e11f36d3bc4d23f620754a948fe7b82b63dcb185



