{"id":"CVE-2023-54171","summary":"tracing: Fix memory leak of iter-\u003etemp when reading trace_pipe","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix memory leak of iter-\u003etemp when reading trace_pipe\n\nkmemleak reports:\n  unreferenced object 0xffff88814d14e200 (size 256):\n    comm \"cat\", pid 336, jiffies 4294871818 (age 779.490s)\n    hex dump (first 32 bytes):\n      04 00 01 03 00 00 00 00 08 00 00 00 00 00 00 00  ................\n      0c d8 c8 9b ff ff ff ff 04 5a ca 9b ff ff ff ff  .........Z......\n    backtrace:\n      [\u003cffffffff9bdff18f\u003e] __kmalloc+0x4f/0x140\n      [\u003cffffffff9bc9238b\u003e] trace_find_next_entry+0xbb/0x1d0\n      [\u003cffffffff9bc9caef\u003e] trace_print_lat_context+0xaf/0x4e0\n      [\u003cffffffff9bc94490\u003e] print_trace_line+0x3e0/0x950\n      [\u003cffffffff9bc95499\u003e] tracing_read_pipe+0x2d9/0x5a0\n      [\u003cffffffff9bf03a43\u003e] vfs_read+0x143/0x520\n      [\u003cffffffff9bf04c2d\u003e] ksys_read+0xbd/0x160\n      [\u003cffffffff9d0f0edf\u003e] do_syscall_64+0x3f/0x90\n      [\u003cffffffff9d2000aa\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nwhen reading file 'trace_pipe', 'iter-\u003etemp' is allocated or relocated\nin trace_find_next_entry() but not freed before 'trace_pipe' is closed.\n\nTo fix it, free 'iter-\u003etemp' in tracing_release_pipe().","modified":"2026-03-31T17:29:50.575186Z","published":"2025-12-30T12:08:45.441Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54171.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1a1e793e021d75cd0accd8f329ec9456e5cd105e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3f42d57a76e7e96585f08855554e002218cbca0c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/954792db9f61b6c0b8a94b8831fed5f146014029"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be970e22c53d5572b2795b79da9716ada937023b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d5a821896360cc8b93a15bd888fabc858c038dc0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54171.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54171"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ff895103a84abc85a5f43ecabc7f67cf36e1348f"},{"fixed":"1a1e793e021d75cd0accd8f329ec9456e5cd105e"},{"fixed":"954792db9f61b6c0b8a94b8831fed5f146014029"},{"fixed":"be970e22c53d5572b2795b79da9716ada937023b"},{"fixed":"3f42d57a76e7e96585f08855554e002218cbca0c"},{"fixed":"d5a821896360cc8b93a15bd888fabc858c038dc0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54171.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.40"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54171.json"}}],"schema_version":"1.7.5"}