CVE-2023-54211 — Improper Update of Reference Count in Linux
Severity
3.3LOW
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix warning in trace_buffered_event_disable()
Warning happened in trace_buffered_event_disable() at
WARN_ON_ONCE(!trace_buffered_event_ref)
Call Trace:
? __warn+0xa5/0x1b0
? trace_buffered_event_disable+0x189/0x1b0
__ftrace_event_enable_disable+0x19e/0x3e0
free_probe_data+0x3b/0xa0
unregister_ftrace_function_probe_func+0x6b8/0x800
event_enable_func+0x2f0/0x3d0
ftrace_process_regex.isra.0+0x12d/0x1b0
ftrace_filter_wri…
Affected Packages4 packages
▶CVEListV5linux/linux0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 — 1488d782c9e43087a3f341b8186cd25f3cf75583+8
🔴Vulnerability Details
3OSV▶
CVE-2023-54211: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix warning in trace_buffered_event_disable() Warning happened in trace_b↗2025-12-30
GHSA▶
GHSA-m579-rv75-wvgq: In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix warning in trace_buffered_event_disable()
Warning happened in trace↗2025-12-30