SB2025100469 - Use-after-free in Linux kernel trace
Published: October 4, 2025 Updated: October 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53560)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the event_hist_trigger_func() function in kernel/trace/trace_events_hist.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1576f0df7b4d1f82db588d6654b89d796fa06929
- https://git.kernel.org/stable/c/4815359056083c555f97a5ee3af86519be5166de
- https://git.kernel.org/stable/c/4a540f63618e525e433b37d2b5522cda08e321d7
- https://git.kernel.org/stable/c/4ffad1528e81c91769d9da1f8436080861c8ec67
- https://git.kernel.org/stable/c/5fd32eb6fa0ac795aa5a64bc004ab68d7b44196a
- https://git.kernel.org/stable/c/6018b585e8c6fa7d85d4b38d9ce49a5b67be7078
- https://git.kernel.org/stable/c/97f54b330c797ed27fba8791baeaa38ace886cbd
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.121