{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53375","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-17T14:54:09.735Z","datePublished":"2025-09-18T13:33:21.664Z","dateUpdated":"2026-05-11T19:43:44.032Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:43:44.032Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Free error logs of tracing instances\n\nWhen a tracing instance is removed, the error messages that hold errors\nthat occurred in the instance needs to be freed. The following reports a\nmemory leak:\n\n # cd /sys/kernel/tracing\n # mkdir instances/foo\n # echo 'hist:keys=x' > instances/foo/events/sched/sched_switch/trigger\n # cat instances/foo/error_log\n [  117.404795] hist:sched:sched_switch: error: Couldn't find field\n   Command: hist:keys=x\n                      ^\n # rmdir instances/foo\n\nThen check for memory leaks:\n\n # echo scan > /sys/kernel/debug/kmemleak\n # cat /sys/kernel/debug/kmemleak\nunreferenced object 0xffff88810d8ec700 (size 192):\n  comm \"bash\", pid 869, jiffies 4294950577 (age 215.752s)\n  hex dump (first 32 bytes):\n    60 dd 68 61 81 88 ff ff 60 dd 68 61 81 88 ff ff  `.ha....`.ha....\n    a0 30 8c 83 ff ff ff ff 26 00 0a 00 00 00 00 00  .0......&.......\n  backtrace:\n    [<00000000dae26536>] kmalloc_trace+0x2a/0xa0\n    [<00000000b2938940>] tracing_log_err+0x277/0x2e0\n    [<000000004a0e1b07>] parse_atom+0x966/0xb40\n    [<0000000023b24337>] parse_expr+0x5f3/0xdb0\n    [<00000000594ad074>] event_hist_trigger_parse+0x27f8/0x3560\n    [<00000000293a9645>] trigger_process_regex+0x135/0x1a0\n    [<000000005c22b4f2>] event_trigger_write+0x87/0xf0\n    [<000000002cadc509>] vfs_write+0x162/0x670\n    [<0000000059c3b9be>] ksys_write+0xca/0x170\n    [<00000000f1cddc00>] do_syscall_64+0x3e/0xc0\n    [<00000000868ac68c>] entry_SYSCALL_64_after_hwframe+0x72/0xdc\nunreferenced object 0xffff888170c35a00 (size 32):\n  comm \"bash\", pid 869, jiffies 4294950577 (age 215.752s)\n  hex dump (first 32 bytes):\n    0a 20 20 43 6f 6d 6d 61 6e 64 3a 20 68 69 73 74  .  Command: hist\n    3a 6b 65 79 73 3d 78 0a 00 00 00 00 00 00 00 00  :keys=x.........\n  backtrace:\n    [<000000006a747de5>] __kmalloc+0x4d/0x160\n    [<000000000039df5f>] tracing_log_err+0x29b/0x2e0\n    [<000000004a0e1b07>] parse_atom+0x966/0xb40\n    [<0000000023b24337>] parse_expr+0x5f3/0xdb0\n    [<00000000594ad074>] event_hist_trigger_parse+0x27f8/0x3560\n    [<00000000293a9645>] trigger_process_regex+0x135/0x1a0\n    [<000000005c22b4f2>] event_trigger_write+0x87/0xf0\n    [<000000002cadc509>] vfs_write+0x162/0x670\n    [<0000000059c3b9be>] ksys_write+0xca/0x170\n    [<00000000f1cddc00>] do_syscall_64+0x3e/0xc0\n    [<00000000868ac68c>] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nThe problem is that the error log needs to be freed when the instance is\nremoved."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/trace.c"],"versions":[{"version":"2f754e771b1a6feba670782e82c45555984ac43b","lessThan":"987f599fc556a4e64c405d8dde32c70311e8c278","status":"affected","versionType":"git"},{"version":"2f754e771b1a6feba670782e82c45555984ac43b","lessThan":"6e36373aa5ffa8e00fe7c71b3209f6f17081e552","status":"affected","versionType":"git"},{"version":"2f754e771b1a6feba670782e82c45555984ac43b","lessThan":"33d5d4e67a0e13c3ca6257fa67bf6503bc000878","status":"affected","versionType":"git"},{"version":"2f754e771b1a6feba670782e82c45555984ac43b","lessThan":"c0cf0f55be043ef67c38f492aa37ed1986d2f6b6","status":"affected","versionType":"git"},{"version":"2f754e771b1a6feba670782e82c45555984ac43b","lessThan":"46771c34d6721abfd9e7903eaed2201051eebec6","status":"affected","versionType":"git"},{"version":"2f754e771b1a6feba670782e82c45555984ac43b","lessThan":"3357c6e429643231e60447b52ffbb7ac895aca22","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/trace.c"],"versions":[{"version":"5.2","status":"affected"},{"version":"0","lessThan":"5.2","status":"unaffected","versionType":"semver"},{"version":"5.4.241","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.178","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.107","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.24","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.11","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.4.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.10.178"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.15.107"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.1.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.2.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/987f599fc556a4e64c405d8dde32c70311e8c278"},{"url":"https://git.kernel.org/stable/c/6e36373aa5ffa8e00fe7c71b3209f6f17081e552"},{"url":"https://git.kernel.org/stable/c/33d5d4e67a0e13c3ca6257fa67bf6503bc000878"},{"url":"https://git.kernel.org/stable/c/c0cf0f55be043ef67c38f492aa37ed1986d2f6b6"},{"url":"https://git.kernel.org/stable/c/46771c34d6721abfd9e7903eaed2201051eebec6"},{"url":"https://git.kernel.org/stable/c/3357c6e429643231e60447b52ffbb7ac895aca22"}],"title":"tracing: Free error logs of tracing instances","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"id":"CVE-2023-53375","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-01-14T18:54:41.639003Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-401","description":"CWE-401 Missing Release of Memory after Effective Lifetime"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-14T19:03:03.455Z"}}]}}