CVE-2023-53388Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Clean dangling pointer on bind error path mtk_drm_bind() can fail, in which case drm_dev_put() is called, destroying the drm_device object. However a pointer to it was still being held in the private object, and that pointer would be passed along to DRM in mtk_drm_sys_prepare() if a suspend were triggered at that point, resulting in a panic. Clean the pointer when destroying the object in the error path to preven

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel4.74.19.276+5
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux119f5173628aa7a0c3cf9db83460d40709e8241d9a48f99aa7bea15e0b1d8b0040c46b4792eddf3b+7
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53388: In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Clean dangling pointer on bind error path mtk_drm_bind() can fail, i2025-09-18
GHSA
GHSA-jj38-96h8-c9q4: In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Clean dangling pointer on bind error path mtk_drm_bind() can fail,2025-09-18

📋Vendor Advisories

2
Red Hat
kernel: drm/mediatek: Clean dangling pointer on bind error path2025-09-18
Debian
CVE-2023-53388: linux - In the Linux kernel, the following vulnerability has been resolved: drm/mediate...2023
CVE-2023-53388 — Use After Free in Linux | cvebase