{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54211","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-30T12:06:44.500Z","datePublished":"2025-12-30T12:11:09.356Z","dateUpdated":"2026-05-11T19:57:37.075Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:57:37.075Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix warning in trace_buffered_event_disable()\n\nWarning happened in trace_buffered_event_disable() at\n  WARN_ON_ONCE(!trace_buffered_event_ref)\n\n  Call Trace:\n   ? __warn+0xa5/0x1b0\n   ? trace_buffered_event_disable+0x189/0x1b0\n   __ftrace_event_enable_disable+0x19e/0x3e0\n   free_probe_data+0x3b/0xa0\n   unregister_ftrace_function_probe_func+0x6b8/0x800\n   event_enable_func+0x2f0/0x3d0\n   ftrace_process_regex.isra.0+0x12d/0x1b0\n   ftrace_filter_write+0xe6/0x140\n   vfs_write+0x1c9/0x6f0\n   [...]\n\nThe cause of the warning is in __ftrace_event_enable_disable(),\ntrace_buffered_event_enable() was called once while\ntrace_buffered_event_disable() was called twice.\nReproduction script show as below, for analysis, see the comments:\n ```\n #!/bin/bash\n\n cd /sys/kernel/tracing/\n\n # 1. Register a 'disable_event' command, then:\n #    1) SOFT_DISABLED_BIT was set;\n #    2) trace_buffered_event_enable() was called first time;\n echo 'cmdline_proc_show:disable_event:initcall:initcall_finish' > \\\n     set_ftrace_filter\n\n # 2. Enable the event registered, then:\n #    1) SOFT_DISABLED_BIT was cleared;\n #    2) trace_buffered_event_disable() was called first time;\n echo 1 > events/initcall/initcall_finish/enable\n\n # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was\n #    set again!!!\n cat /proc/cmdline\n\n # 4. Unregister the 'disable_event' command, then:\n #    1) SOFT_DISABLED_BIT was cleared again;\n #    2) trace_buffered_event_disable() was called second time!!!\n echo '!cmdline_proc_show:disable_event:initcall:initcall_finish' > \\\n     set_ftrace_filter\n ```\n\nTo fix it, IIUC, we can change to call trace_buffered_event_enable() at\nfist time soft-mode enabled, and call trace_buffered_event_disable() at\nlast time soft-mode disabled."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/trace_events.c"],"versions":[{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"1488d782c9e43087a3f341b8186cd25f3cf75583","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"b4f4ab423107dc1ba8e9cc6488c645be6403d3f5","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"cdcc35e6454133feb61561b4e0d0c80e52cbc2ba","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"a6d2fd1703cdc8ecfc3e73987e0fb7474ae2b074","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"813cede7b2f5a4b1b75d2d4bb4e705cc8e063b20","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"a3a3c7bddab9b6c5690b20796ef5e332b8c48afb","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"528c9d73153754defb748f0b96ad33308668d817","status":"affected","versionType":"git"},{"version":"0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9","lessThan":"dea499781a1150d285c62b26659f62fb00824fce","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/trace_events.c"],"versions":[{"version":"4.7","status":"affected"},{"version":"0","lessThan":"4.7","status":"unaffected","versionType":"semver"},{"version":"4.14.322","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.291","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.253","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.190","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.124","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.43","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.4.8","lessThanOrEqual":"6.4.*","status":"unaffected","versionType":"semver"},{"version":"6.5","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"4.14.322"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"4.19.291"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"5.4.253"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"5.10.190"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"5.15.124"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"6.1.43"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"6.4.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"6.5"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/1488d782c9e43087a3f341b8186cd25f3cf75583"},{"url":"https://git.kernel.org/stable/c/b4f4ab423107dc1ba8e9cc6488c645be6403d3f5"},{"url":"https://git.kernel.org/stable/c/cdcc35e6454133feb61561b4e0d0c80e52cbc2ba"},{"url":"https://git.kernel.org/stable/c/a6d2fd1703cdc8ecfc3e73987e0fb7474ae2b074"},{"url":"https://git.kernel.org/stable/c/813cede7b2f5a4b1b75d2d4bb4e705cc8e063b20"},{"url":"https://git.kernel.org/stable/c/a3a3c7bddab9b6c5690b20796ef5e332b8c48afb"},{"url":"https://git.kernel.org/stable/c/528c9d73153754defb748f0b96ad33308668d817"},{"url":"https://git.kernel.org/stable/c/dea499781a1150d285c62b26659f62fb00824fce"}],"title":"tracing: Fix warning in trace_buffered_event_disable()","x_generator":{"engine":"bippy-1.2.0"}}}}