CVE-2023-53316Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Free resources after unregistering them The DP component's unbind operation walks through the submodules to unregister and clean things up. But if the unbind happens because the DP controller itself is being removed, all the memory for those submodules has just been freed. Change the order of these operations to avoid the many use-after-free that otherwise happens in this code path. Patchwork: https://patchwork.f

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.105.10.188+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxc943b4948b5848fc0e07f875edbd35a973879e22c67a55f7cc8d767d624235bf1bcd0947e56abe0f+6
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hph3-9q45-4pf2: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Free resources after unregistering them The DP component's unbind op2025-09-16
OSV
CVE-2023-53316: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Free resources after unregistering them The DP component's unbind oper2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: drm/msm/dp: Free resources after unregistering them2025-09-16
Debian
CVE-2023-53316: linux - In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp:...2023
CVE-2023-53316 — Use After Free in Linux | cvebase