CVE-2023-53629Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 20

Description

In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in midcomms commit While working on processing dlm message in softirq context I experienced the following KASAN use-after-free warning: [ 151.760477] ================================================================== [ 151.761803] BUG: KASAN: use-after-free in dlm_midcomms_commit_mhandle+0x19d/0x4b0 [ 151.763414] Read of size 4 at addr ffff88811a980c60 by task lock_torture/1347 [ 151.765284] CPU:

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.146.1.20+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux489d8e559c6596eb08e16447d9830bc39afbe54ea3b0e9ac3c2447008db942d51f593841d8329e99+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 6.1.19/6.2.2 Dlm Message dlm_midcomms_commit_mhandle use after free (WID-SEC-2025-2229)2026-04-20
GHSA
GHSA-rf27-4m25-62jv: In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in midcomms commit While working on processing dlm m2025-10-07
OSV
CVE-2023-53629: In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in midcomms commit While working on processing dlm mes2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: fs: dlm: fix use after free in midcomms commit2025-10-07
Debian
CVE-2023-53629: linux - In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fi...2023