CVE-2025-68376
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
coresight: ETR: Fix ETR buffer use-after-free issue<br />
<br />
When ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed<br />
and enabled again, currently sysfs_buf will point to the newly<br />
allocated memory(buf_new) and free the old memory(buf_old). But the<br />
etr_buf that is being used by the ETR remains pointed to buf_old, not<br />
updated to buf_new. In this case, it will result in a memory<br />
use-after-free issue.<br />
<br />
Fix this by checking ETR&#39;s mode before updating and releasing buf_old,<br />
if the mode is CS_MODE_SYSFS, then skip updating and releasing it.



