CVE-2023-53544Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: davinci: Fix clk use after free The remove function first frees the clks and only then calls cpufreq_unregister_driver(). If one of the cpufreq callbacks is called just before cpufreq_unregister_driver() is run, the freed clks might be used.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel2.6.334.14.308+2
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux6601b8030de3e9c29930684eeac15302a59f991a66b3bbe6fbd8dd410868e5b53ac3944a934b9310+4
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3cqr-ghj9-p46w: In the Linux kernel, the following vulnerability has been resolved: cpufreq: davinci: Fix clk use after free The remove function first frees the clk2025-10-04
OSV
CVE-2023-53544: In the Linux kernel, the following vulnerability has been resolved: cpufreq: davinci: Fix clk use after free The remove function first frees the clks2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: cpufreq: davinci: Fix clk use after free2025-10-04
Debian
CVE-2023-53544: linux - In the Linux kernel, the following vulnerability has been resolved: cpufreq: da...2023