CVE-2023-53557
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
06/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fprobe: Release rethook after the ftrace_ops is unregistered<br />
<br />
While running bpf selftests it&#39;s possible to get following fault:<br />
<br />
general protection fault, probably for non-canonical address \<br />
0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI<br />
...<br />
Call Trace:<br />
<br />
fprobe_handler+0xc1/0x270<br />
? __pfx_bpf_testmod_init+0x10/0x10<br />
? __pfx_bpf_testmod_init+0x10/0x10<br />
? bpf_fentry_test1+0x5/0x10<br />
? bpf_fentry_test1+0x5/0x10<br />
? bpf_testmod_init+0x22/0x80<br />
? do_one_initcall+0x63/0x2e0<br />
? rcu_is_watching+0xd/0x40<br />
? kmalloc_trace+0xaf/0xc0<br />
? do_init_module+0x60/0x250<br />
? __do_sys_finit_module+0xac/0x120<br />
? do_syscall_64+0x37/0x90<br />
? entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
<br />
<br />
In unregister_fprobe function we can&#39;t release fp->rethook while it&#39;s<br />
possible there are some of its users still running on another cpu.<br />
<br />
Moving rethook_free call after fp->ops is unregistered with<br />
unregister_ftrace_function call.



