{
  "threat_severity" : "Low",
  "public_date" : "2025-12-09T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: perf tool x86: Fix perf_env memory leak",
    "id" : "2420294",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2420294"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-772",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nperf tool x86: Fix perf_env memory leak\nFound by leak sanitizer:\n```\n==1632594==ERROR: LeakSanitizer: detected memory leaks\nDirect leak of 21 byte(s) in 1 object(s) allocated from:\n#0 0x7f2953a7077b in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:439\n#1 0x556701d6fbbf in perf_env__read_cpuid util/env.c:369\n#2 0x556701d70589 in perf_env__cpuid util/env.c:465\n#3 0x55670204bba2 in x86__is_amd_cpu arch/x86/util/env.c:14\n#4 0x5567020487a2 in arch__post_evsel_config arch/x86/util/evsel.c:83\n#5 0x556701d8f78b in evsel__config util/evsel.c:1366\n#6 0x556701ef5872 in evlist__config util/record.c:108\n#7 0x556701cd6bcd in test__PERF_RECORD tests/perf-record.c:112\n#8 0x556701cacd07 in run_test tests/builtin-test.c:236\n#9 0x556701cacfac in test_and_print tests/builtin-test.c:265\n#10 0x556701cadddb in __cmd_test tests/builtin-test.c:402\n#11 0x556701caf2aa in cmd_test tests/builtin-test.c:559\n#12 0x556701d3b557 in run_builtin tools/perf/perf.c:323\n#13 0x556701d3bac8 in handle_internal_command tools/perf/perf.c:377\n#14 0x556701d3be90 in run_argv tools/perf/perf.c:421\n#15 0x556701d3c3f8 in main tools/perf/perf.c:537\n#16 0x7f2952a46189 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58\nSUMMARY: AddressSanitizer: 21 byte(s) leaked in 1 allocation(s).\n```" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-11-14T00:00:00Z",
    "advisory" : "RHSA-2023:7077",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-513.5.1.el8_9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-53793\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53793\nhttps://lore.kernel.org/linux-cve-announce/2025120941-CVE-2023-53793-0dc1@gregkh/T" ],
  "name" : "CVE-2023-53793",
  "csaw" : false
}