DEBIAN-CVE-2023-53468

Source
https://security-tracker.debian.org/tracker/CVE-2023-53468
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53468.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-53468
Upstream
Published
2025-10-01T12:15:48Z
Modified
2025-10-02T09:16:52.307581Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memory leak in allocwbufs() kmemleak reported a sequence of memory leaks, and show them as following: unreferenced object 0xffff8881575f8400 (size 1024): comm "mount", pid 19625, jiffies 4297119604 (age 20.383s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff8176cecd>] _kmalloc+0x4d/0x150 [<ffffffffa0406b2b>] ubifsmount+0x307b/0x7170 [ubifs] [<ffffffff819fa8fd>] legacygettree+0xed/0x1d0 [<ffffffff81936f2d>] vfsgettree+0x7d/0x230 [<ffffffff819b2bd4>] pathmount+0xdd4/0x17b0 [<ffffffff819b37aa>] _x64sysmount+0x1fa/0x270 [<ffffffff83c14295>] dosyscall64+0x35/0x80 [<ffffffff83e0006a>] entrySYSCALL64afterhwframe+0x46/0xb0 unreferenced object 0xffff8881798a6e00 (size 512): comm "mount", pid 19677, jiffies 4297121912 (age 37.816s) hex dump (first 32 bytes): 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk backtrace: [<ffffffff8176cecd>] _kmalloc+0x4d/0x150 [<ffffffffa0418342>] ubifswbufinit+0x52/0x480 [ubifs] [<ffffffffa0406ca5>] ubifsmount+0x31f5/0x7170 [ubifs] [<ffffffff819fa8fd>] legacygettree+0xed/0x1d0 [<ffffffff81936f2d>] vfsgettree+0x7d/0x230 [<ffffffff819b2bd4>] pathmount+0xdd4/0x17b0 [<ffffffff819b37aa>] _x64sysmount+0x1fa/0x270 [<ffffffff83c14295>] dosyscall64+0x35/0x80 [<ffffffff83e0006a>] entrySYSCALL64afterhwframe+0x46/0xb0 The problem is that the ubifswbufinit() returns an error in the loop which in the allocwbufs(), then the wbuf->buf and wbuf->inodes that were successfully alloced before are not freed. Fix it by adding error hanging path in allocwbufs() which frees the memory alloced before when ubifswbuf_init() returns an error.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}