CVE-2023-53587Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Sync IRQ works before buffer destruction If something was written to the buffer just before destruction, it may be possible (maybe not in a real system, but it did happen in ARCH=um with time-travel) to destroy the ringbuffer before the IRQ work ran, leading this KASAN report (or a crash without KASAN): BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a Read of size 8 at addr 000000006d640a48 by tas

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.104.14.315+7
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux15693458c4bc0693fd63a50d60f35b628fcf4e29372c5ee537b8366b64b691ba29e9335525e1655e+9
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53587: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Sync IRQ works before buffer destruction If something was written to2025-10-04
GHSA
GHSA-7wv9-8c5x-6hmc: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Sync IRQ works before buffer destruction If something was written t2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: ring-buffer: Sync IRQ works before buffer destruction2025-10-04
Debian
CVE-2023-53587: linux - In the Linux kernel, the following vulnerability has been resolved: ring-buffer...2023