CVE-2023-53221
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Fix memleak due to fentry attach failure<br />
<br />
If it fails to attach fentry, the allocated bpf trampoline image will be<br />
left in the system. That can be verified by checking /proc/kallsyms.<br />
<br />
This meamleak can be verified by a simple bpf program as follows:<br />
<br />
SEC("fentry/trap_init")<br />
int fentry_run()<br />
{<br />
return 0;<br />
}<br />
<br />
It will fail to attach trap_init because this function is freed after<br />
kernel init, and then we can find the trampoline image is left in the<br />
system by checking /proc/kallsyms.<br />
<br />
$ tail /proc/kallsyms<br />
ffffffffc0613000 t bpf_trampoline_6442453466_1 [bpf]<br />
ffffffffc06c3000 t bpf_trampoline_6442453466_1 [bpf]<br />
<br />
$ bpftool btf dump file /sys/kernel/btf/vmlinux | grep "FUNC &#39;trap_init&#39;"<br />
[2522] FUNC &#39;trap_init&#39; type_id=119 linkage=static<br />
<br />
$ echo $((6442453466 & 0x7fffffff))<br />
2522<br />
<br />
Note that there are two left bpf trampoline images, that is because the<br />
libbpf will fallback to raw tracepoint if -EINVAL is returned.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.28 (including) | 5.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11.11 (including) | 5.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12.1 (including) | 6.1.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.3.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.4.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.12:rc8:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



