CVE-2023-53557

Source
https://cve.org/CVERecord?id=CVE-2023-53557
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53557.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53557
Downstream
Related
Published
2025-10-04T15:17:02.077Z
Modified
2026-03-11T07:49:09.639681471Z
Summary
fprobe: Release rethook after the ftrace_ops is unregistered
Details

In the Linux kernel, the following vulnerability has been resolved:

fprobe: Release rethook after the ftrace_ops is unregistered

While running bpf selftests it's possible to get following fault:

general protection fault, probably for non-canonical address \ 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP DEBUGPAGEALLOC NOPTI ... Call Trace: <TASK> fprobehandler+0xc1/0x270 ? __pfxbpftestmod_init+0x10/0x10 ? __pfxbpftestmodinit+0x10/0x10 ? bpffentrytest1+0x5/0x10 ? bpffentrytest1+0x5/0x10 ? bpftestmodinit+0x22/0x80 ? dooneinitcall+0x63/0x2e0 ? rcuiswatching+0xd/0x40 ? kmalloctrace+0xaf/0xc0 ? doinitmodule+0x60/0x250 ? _dosysfinitmodule+0xac/0x120 ? dosyscall64+0x37/0x90 ? entrySYSCALL64afterhwframe+0x72/0xdc </TASK>

In unregister_fprobe function we can't release fp->rethook while it's possible there are some of its users still running on another cpu.

Moving rethookfree call after fp->ops is unregistered with unregisterftrace_function call.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53557.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5b0ab78998e32564a011b14c4c7f9c81e2d42b9d
Fixed
ce3ec57faff559ccae1e0150c1f077eb2df648a4
Fixed
03d63255a5783243c110aec5e6ae2f1475c3be76
Fixed
5f81018753dfd4989e33ece1f0cb6b8aae498b82

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53557.json"