CVE-2023-54211
Use-After-Free Warning in Linux Kernel Ftrace Event Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a warning issue in the Linux kernel's tracing subsystem, specifically in the function trace_buffered_event_disable(). The problem occurs because trace_buffered_event_enable() is called once, but trace_buffered_event_disable() is called twice, causing a warning (WARN_ON_ONCE) due to an unexpected state. This happens when enabling and disabling certain trace events in a specific sequence, leading to inconsistent internal state management. The fix involves ensuring that trace_buffered_event_enable() is called only once when soft-mode is enabled and trace_buffered_event_disable() is called only once when soft-mode is disabled.
How can this vulnerability impact me? :
The vulnerability causes a warning in the kernel tracing system due to improper enable/disable calls, which could lead to unstable or unexpected behavior in kernel tracing features. However, there is no indication that this leads to security breaches or system compromise. The impact is primarily related to kernel tracing reliability and stability rather than direct security risks.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by reproducing the warning condition in the Linux kernel tracing subsystem. You can use the following commands to test for the issue: 1. Change directory to the tracing filesystem: cd /sys/kernel/tracing/ 2. Register a disable_event command: echo 'cmdline_proc_show:disable_event:initcall:initcall_finish' > set_ftrace_filter 3. Enable the event: echo 1 > events/initcall/initcall_finish/enable 4. Trigger the event by reading /proc/cmdline: cat /proc/cmdline 5. Unregister the disable_event command: echo '!cmdline_proc_show:disable_event:initcall:initcall_finish' > set_ftrace_filter If the warning occurs during these steps, the vulnerability is present.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix has been applied. The fix involves changing the calls so that trace_buffered_event_enable() is called only the first time soft-mode is enabled, and trace_buffered_event_disable() is called only the last time soft-mode is disabled. Until an updated kernel is applied, avoid using the affected tracing features that trigger this warning.