Home

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Make sure trace_printk() can output as soon as it can be used Currently trace_printk() can be used as soon as early_trace_init() is called from start_kernel(). But if a crash happens, and "ftrace_dump_on_oops" is set on the kernel command line, all you get will be: [ 0.456075] <idle>-0 0dN.2. 347519us : Unknown type 6 [ 0.456075] <idle>-0 0dN.2. 353141us : Unknown type 6 [ 0.456075] <idle>-0 0dN.2. 358684us : Unknown type 6 This is because the trace_printk() event (type 6) hasn't been registered yet. That gets done via an early_initcall(), which may be early, but not early enough. Instead of registering the trace_printk() event (and other ftrace events, which are not trace events) via an early_initcall(), have them registered at the same time that trace_printk() can be used. This way, if there is a crash before early_initcall(), then the trace_printk()s will actually be useful.

PUBLISHED Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before f97eb0ab066133483a65c93eb894748de2f6b598
affected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before b94d7c7654356860dd7719120c7d15ba38b6162a
affected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before 76b2390fdc80c0a8300e5da5b6b62d201b6fe9ce
affected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before de3930a4883ddad2244efd6d349013294c62c75c
affected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before b0af180514edea6c83dc9a299d9f383009c99f25
affected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before 198c83963f6335ca6d690cff067679560f2a3a22
affected

e725c731e3bb1e892e7b564c945b121cb41d1087 (git) before 3bb06eb6e9acf7c4a3e1b5bc87aed398ff8e2253
affected

Default status
affected

4.12
affected

Any version before 4.12
unaffected

4.14.305 (semver)
unaffected

4.19.272 (semver)
unaffected

5.4.231 (semver)
unaffected

5.10.166 (semver)
unaffected

5.15.91 (semver)
unaffected

6.1.9 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f97eb0ab066133483a65c93eb894748de2f6b598

git.kernel.org/...c/b94d7c7654356860dd7719120c7d15ba38b6162a

git.kernel.org/...c/76b2390fdc80c0a8300e5da5b6b62d201b6fe9ce

git.kernel.org/...c/de3930a4883ddad2244efd6d349013294c62c75c

git.kernel.org/...c/b0af180514edea6c83dc9a299d9f383009c99f25

git.kernel.org/...c/198c83963f6335ca6d690cff067679560f2a3a22

git.kernel.org/...c/3bb06eb6e9acf7c4a3e1b5bc87aed398ff8e2253

cve.org (CVE-2023-53007)

nvd.nist.gov (CVE-2023-53007)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.