CVE-2023-53572Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to get the next item on the loop.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.115.15.121+3
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux77d8f3068c63ee0983f0b5ba3207d3f7cce11be4f95ff838ac39f861d1f95a0f3bbb1e01c2517d79+5
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53572: In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is free2025-10-04
GHSA
GHSA-3ffw-9f6g-j2rr: In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is fr2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: clk: imx: scu: use _safe list iterator to avoid a use after free2025-10-04
Debian
CVE-2023-53572: linux - In the Linux kernel, the following vulnerability has been resolved: clk: imx: s...2023