CVE-2023-53375
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/09/2025
Última modificación:
19/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tracing: Free error logs of tracing instances<br />
<br />
When a tracing instance is removed, the error messages that hold errors<br />
that occurred in the instance needs to be freed. The following reports a<br />
memory leak:<br />
<br />
# cd /sys/kernel/tracing<br />
# mkdir instances/foo<br />
# echo &#39;hist:keys=x&#39; > instances/foo/events/sched/sched_switch/trigger<br />
# cat instances/foo/error_log<br />
[ 117.404795] hist:sched:sched_switch: error: Couldn&#39;t find field<br />
Command: hist:keys=x<br />
^<br />
# rmdir instances/foo<br />
<br />
Then check for memory leaks:<br />
<br />
# echo scan > /sys/kernel/debug/kmemleak<br />
# cat /sys/kernel/debug/kmemleak<br />
unreferenced object 0xffff88810d8ec700 (size 192):<br />
comm "bash", pid 869, jiffies 4294950577 (age 215.752s)<br />
hex dump (first 32 bytes):<br />
60 dd 68 61 81 88 ff ff 60 dd 68 61 81 88 ff ff `.ha....`.ha....<br />
a0 30 8c 83 ff ff ff ff 26 00 0a 00 00 00 00 00 .0......&.......<br />
backtrace:<br />
[] kmalloc_trace+0x2a/0xa0<br />
[] tracing_log_err+0x277/0x2e0<br />
[] parse_atom+0x966/0xb40<br />
[] parse_expr+0x5f3/0xdb0<br />
[] event_hist_trigger_parse+0x27f8/0x3560<br />
[] trigger_process_regex+0x135/0x1a0<br />
[] event_trigger_write+0x87/0xf0<br />
[] vfs_write+0x162/0x670<br />
[] ksys_write+0xca/0x170<br />
[] do_syscall_64+0x3e/0xc0<br />
[] entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
unreferenced object 0xffff888170c35a00 (size 32):<br />
comm "bash", pid 869, jiffies 4294950577 (age 215.752s)<br />
hex dump (first 32 bytes):<br />
0a 20 20 43 6f 6d 6d 61 6e 64 3a 20 68 69 73 74 . Command: hist<br />
3a 6b 65 79 73 3d 78 0a 00 00 00 00 00 00 00 00 :keys=x.........<br />
backtrace:<br />
[] __kmalloc+0x4d/0x160<br />
[] tracing_log_err+0x29b/0x2e0<br />
[] parse_atom+0x966/0xb40<br />
[] parse_expr+0x5f3/0xdb0<br />
[] event_hist_trigger_parse+0x27f8/0x3560<br />
[] trigger_process_regex+0x135/0x1a0<br />
[] event_trigger_write+0x87/0xf0<br />
[] vfs_write+0x162/0x670<br />
[] ksys_write+0xca/0x170<br />
[] do_syscall_64+0x3e/0xc0<br />
[] entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
<br />
The problem is that the error log needs to be freed when the instance is<br />
removed.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/3357c6e429643231e60447b52ffbb7ac895aca22
- https://git.kernel.org/stable/c/33d5d4e67a0e13c3ca6257fa67bf6503bc000878
- https://git.kernel.org/stable/c/46771c34d6721abfd9e7903eaed2201051eebec6
- https://git.kernel.org/stable/c/6e36373aa5ffa8e00fe7c71b3209f6f17081e552
- https://git.kernel.org/stable/c/987f599fc556a4e64c405d8dde32c70311e8c278
- https://git.kernel.org/stable/c/c0cf0f55be043ef67c38f492aa37ed1986d2f6b6