CVE-2023-53468

Source
https://cve.org/CVERecord?id=CVE-2023-53468
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53468.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53468
Downstream
Related
Published
2025-10-01T11:42:38.673Z
Modified
2026-04-02T09:44:17.589029Z
Summary
ubifs: Fix memory leak in alloc_wbufs()
Details

In the Linux kernel, the following vulnerability has been resolved:

ubifs: Fix memory leak in alloc_wbufs()

kmemleak reported a sequence of memory leaks, and show them as following:

unreferenced object 0xffff8881575f8400 (size 1024): comm "mount", pid 19625, jiffies 4297119604 (age 20.383s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff8176cecd>] __kmalloc+0x4d/0x150 [<ffffffffa0406b2b>] ubifsmount+0x307b/0x7170 [ubifs] [<ffffffff819fa8fd>] legacygettree+0xed/0x1d0 [<ffffffff81936f2d>] vfsgettree+0x7d/0x230 [<ffffffff819b2bd4>] pathmount+0xdd4/0x17b0 [<ffffffff819b37aa>] __x64sysmount+0x1fa/0x270 [<ffffffff83c14295>] dosyscall64+0x35/0x80 [<ffffffff83e0006a>] entrySYSCALL64afterhwframe+0x46/0xb0

unreferenced object 0xffff8881798a6e00 (size 512): comm "mount", pid 19677, jiffies 4297121912 (age 37.816s) hex dump (first 32 bytes): 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk backtrace: [<ffffffff8176cecd>] __kmalloc+0x4d/0x150 [<ffffffffa0418342>] ubifswbufinit+0x52/0x480 [ubifs] [<ffffffffa0406ca5>] ubifsmount+0x31f5/0x7170 [ubifs] [<ffffffff819fa8fd>] legacygettree+0xed/0x1d0 [<ffffffff81936f2d>] vfsgettree+0x7d/0x230 [<ffffffff819b2bd4>] pathmount+0xdd4/0x17b0 [<ffffffff819b37aa>] __x64sysmount+0x1fa/0x270 [<ffffffff83c14295>] dosyscall64+0x35/0x80 [<ffffffff83e0006a>] entrySYSCALL64afterhwframe+0x46/0xb0

The problem is that the ubifswbufinit() returns an error in the loop which in the alloc_wbufs(), then the wbuf->buf and wbuf->inodes that were successfully alloced before are not freed.

Fix it by adding error hanging path in allocwbufs() which frees the memory alloced before when ubifswbuf_init() returns an error.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53468.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d
Fixed
1f206002c6bc302bface871ef3f72c0bbcaa931c
Fixed
bf50229494f0443b3f08427d7df63e5a7e2a796a
Fixed
3e29634eb56e6547272fe4e568f63421f8b3b9fa
Fixed
26ec45f1c504e15268383019df139d7983f1e67f
Fixed
e11f36d3bc4d23f620754a948fe7b82b63dcb185
Fixed
4a1ff3c5d04b9079b4f768d9a71b51c4af578dd2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53468.json"