CVE-2023-54211 (GCVE-0-2023-54211)
Vulnerability from cvelistv5 – Published: 2025-12-30 12:11 – Updated: 2025-12-30 12:11
VLAI?
Title
tracing: Fix warning in trace_buffered_event_disable()
Summary
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix warning in trace_buffered_event_disable()
Warning happened in trace_buffered_event_disable() at
WARN_ON_ONCE(!trace_buffered_event_ref)
Call Trace:
? __warn+0xa5/0x1b0
? trace_buffered_event_disable+0x189/0x1b0
__ftrace_event_enable_disable+0x19e/0x3e0
free_probe_data+0x3b/0xa0
unregister_ftrace_function_probe_func+0x6b8/0x800
event_enable_func+0x2f0/0x3d0
ftrace_process_regex.isra.0+0x12d/0x1b0
ftrace_filter_write+0xe6/0x140
vfs_write+0x1c9/0x6f0
[...]
The cause of the warning is in __ftrace_event_enable_disable(),
trace_buffered_event_enable() was called once while
trace_buffered_event_disable() was called twice.
Reproduction script show as below, for analysis, see the comments:
```
#!/bin/bash
cd /sys/kernel/tracing/
# 1. Register a 'disable_event' command, then:
# 1) SOFT_DISABLED_BIT was set;
# 2) trace_buffered_event_enable() was called first time;
echo 'cmdline_proc_show:disable_event:initcall:initcall_finish' > \
set_ftrace_filter
# 2. Enable the event registered, then:
# 1) SOFT_DISABLED_BIT was cleared;
# 2) trace_buffered_event_disable() was called first time;
echo 1 > events/initcall/initcall_finish/enable
# 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was
# set again!!!
cat /proc/cmdline
# 4. Unregister the 'disable_event' command, then:
# 1) SOFT_DISABLED_BIT was cleared again;
# 2) trace_buffered_event_disable() was called second time!!!
echo '!cmdline_proc_show:disable_event:initcall:initcall_finish' > \
set_ftrace_filter
```
To fix it, IIUC, we can change to call trace_buffered_event_enable() at
fist time soft-mode enabled, and call trace_buffered_event_disable() at
last time soft-mode disabled.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < 1488d782c9e43087a3f341b8186cd25f3cf75583
(git)
Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < b4f4ab423107dc1ba8e9cc6488c645be6403d3f5 (git) Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < cdcc35e6454133feb61561b4e0d0c80e52cbc2ba (git) Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < a6d2fd1703cdc8ecfc3e73987e0fb7474ae2b074 (git) Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < 813cede7b2f5a4b1b75d2d4bb4e705cc8e063b20 (git) Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < a3a3c7bddab9b6c5690b20796ef5e332b8c48afb (git) Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < 528c9d73153754defb748f0b96ad33308668d817 (git) Affected: 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 , < dea499781a1150d285c62b26659f62fb00824fce (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/trace/trace_events.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "1488d782c9e43087a3f341b8186cd25f3cf75583",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "b4f4ab423107dc1ba8e9cc6488c645be6403d3f5",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "cdcc35e6454133feb61561b4e0d0c80e52cbc2ba",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "a6d2fd1703cdc8ecfc3e73987e0fb7474ae2b074",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "813cede7b2f5a4b1b75d2d4bb4e705cc8e063b20",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "a3a3c7bddab9b6c5690b20796ef5e332b8c48afb",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "528c9d73153754defb748f0b96ad33308668d817",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
},
{
"lessThan": "dea499781a1150d285c62b26659f62fb00824fce",
"status": "affected",
"version": "0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"kernel/trace/trace_events.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.7"
},
{
"lessThan": "4.7",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.322",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.291",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.253",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.190",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.124",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.43",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.*",
"status": "unaffected",
"version": "6.4.8",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.5",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.322",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.291",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.253",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.190",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.124",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.43",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.8",
"versionStartIncluding": "4.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5",
"versionStartIncluding": "4.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix warning in trace_buffered_event_disable()\n\nWarning happened in trace_buffered_event_disable() at\n WARN_ON_ONCE(!trace_buffered_event_ref)\n\n Call Trace:\n ? __warn+0xa5/0x1b0\n ? trace_buffered_event_disable+0x189/0x1b0\n __ftrace_event_enable_disable+0x19e/0x3e0\n free_probe_data+0x3b/0xa0\n unregister_ftrace_function_probe_func+0x6b8/0x800\n event_enable_func+0x2f0/0x3d0\n ftrace_process_regex.isra.0+0x12d/0x1b0\n ftrace_filter_write+0xe6/0x140\n vfs_write+0x1c9/0x6f0\n [...]\n\nThe cause of the warning is in __ftrace_event_enable_disable(),\ntrace_buffered_event_enable() was called once while\ntrace_buffered_event_disable() was called twice.\nReproduction script show as below, for analysis, see the comments:\n ```\n #!/bin/bash\n\n cd /sys/kernel/tracing/\n\n # 1. Register a \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was set;\n # 2) trace_buffered_event_enable() was called first time;\n echo \u0027cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n\n # 2. Enable the event registered, then:\n # 1) SOFT_DISABLED_BIT was cleared;\n # 2) trace_buffered_event_disable() was called first time;\n echo 1 \u003e events/initcall/initcall_finish/enable\n\n # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was\n # set again!!!\n cat /proc/cmdline\n\n # 4. Unregister the \u0027disable_event\u0027 command, then:\n # 1) SOFT_DISABLED_BIT was cleared again;\n # 2) trace_buffered_event_disable() was called second time!!!\n echo \u0027!cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\n set_ftrace_filter\n ```\n\nTo fix it, IIUC, we can change to call trace_buffered_event_enable() at\nfist time soft-mode enabled, and call trace_buffered_event_disable() at\nlast time soft-mode disabled."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-30T12:11:09.356Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/1488d782c9e43087a3f341b8186cd25f3cf75583"
},
{
"url": "https://git.kernel.org/stable/c/b4f4ab423107dc1ba8e9cc6488c645be6403d3f5"
},
{
"url": "https://git.kernel.org/stable/c/cdcc35e6454133feb61561b4e0d0c80e52cbc2ba"
},
{
"url": "https://git.kernel.org/stable/c/a6d2fd1703cdc8ecfc3e73987e0fb7474ae2b074"
},
{
"url": "https://git.kernel.org/stable/c/813cede7b2f5a4b1b75d2d4bb4e705cc8e063b20"
},
{
"url": "https://git.kernel.org/stable/c/a3a3c7bddab9b6c5690b20796ef5e332b8c48afb"
},
{
"url": "https://git.kernel.org/stable/c/528c9d73153754defb748f0b96ad33308668d817"
},
{
"url": "https://git.kernel.org/stable/c/dea499781a1150d285c62b26659f62fb00824fce"
}
],
"title": "tracing: Fix warning in trace_buffered_event_disable()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54211",
"datePublished": "2025-12-30T12:11:09.356Z",
"dateReserved": "2025-12-30T12:06:44.500Z",
"dateUpdated": "2025-12-30T12:11:09.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54211\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-30T13:16:09.303\",\"lastModified\":\"2025-12-30T13:16:09.303\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntracing: Fix warning in trace_buffered_event_disable()\\n\\nWarning happened in trace_buffered_event_disable() at\\n WARN_ON_ONCE(!trace_buffered_event_ref)\\n\\n Call Trace:\\n ? __warn+0xa5/0x1b0\\n ? trace_buffered_event_disable+0x189/0x1b0\\n __ftrace_event_enable_disable+0x19e/0x3e0\\n free_probe_data+0x3b/0xa0\\n unregister_ftrace_function_probe_func+0x6b8/0x800\\n event_enable_func+0x2f0/0x3d0\\n ftrace_process_regex.isra.0+0x12d/0x1b0\\n ftrace_filter_write+0xe6/0x140\\n vfs_write+0x1c9/0x6f0\\n [...]\\n\\nThe cause of the warning is in __ftrace_event_enable_disable(),\\ntrace_buffered_event_enable() was called once while\\ntrace_buffered_event_disable() was called twice.\\nReproduction script show as below, for analysis, see the comments:\\n ```\\n #!/bin/bash\\n\\n cd /sys/kernel/tracing/\\n\\n # 1. Register a \u0027disable_event\u0027 command, then:\\n # 1) SOFT_DISABLED_BIT was set;\\n # 2) trace_buffered_event_enable() was called first time;\\n echo \u0027cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\\\\n set_ftrace_filter\\n\\n # 2. Enable the event registered, then:\\n # 1) SOFT_DISABLED_BIT was cleared;\\n # 2) trace_buffered_event_disable() was called first time;\\n echo 1 \u003e events/initcall/initcall_finish/enable\\n\\n # 3. Try to call into cmdline_proc_show(), then SOFT_DISABLED_BIT was\\n # set again!!!\\n cat /proc/cmdline\\n\\n # 4. Unregister the \u0027disable_event\u0027 command, then:\\n # 1) SOFT_DISABLED_BIT was cleared again;\\n # 2) trace_buffered_event_disable() was called second time!!!\\n echo \u0027!cmdline_proc_show:disable_event:initcall:initcall_finish\u0027 \u003e \\\\\\n set_ftrace_filter\\n ```\\n\\nTo fix it, IIUC, we can change to call trace_buffered_event_enable() at\\nfist time soft-mode enabled, and call trace_buffered_event_disable() at\\nlast time soft-mode disabled.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1488d782c9e43087a3f341b8186cd25f3cf75583\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/528c9d73153754defb748f0b96ad33308668d817\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/813cede7b2f5a4b1b75d2d4bb4e705cc8e063b20\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a3a3c7bddab9b6c5690b20796ef5e332b8c48afb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a6d2fd1703cdc8ecfc3e73987e0fb7474ae2b074\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b4f4ab423107dc1ba8e9cc6488c645be6403d3f5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cdcc35e6454133feb61561b4e0d0c80e52cbc2ba\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dea499781a1150d285c62b26659f62fb00824fce\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…