CVE-2023-53638Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: octeon_ep: cancel queued works in probe error path If it fails to get the devices's MAC address, octep_probe exits while leaving the delayed work intr_poll_task queued. When the work later runs, it's a use after free. Move the cancelation of intr_poll_task from octep_remove into octep_device_cleanup. This does not change anything in the octep_remove flow, but octep_device_cleanup is called also in the octep_probe error path,

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.46.4.12+1
Debianlinux/linux_kernel< 6.4.13-1+1
CVEListV5linux/linux24d4333233b378114106a1327d3d635a004f438762312e2f6466b5f0a120542a38b410d88a34ed00+2
debiandebian/linux< linux 6.4.13-1 (forky)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jg3h-cxcf-h3vq: In the Linux kernel, the following vulnerability has been resolved: octeon_ep: cancel queued works in probe error path If it fails to get the device2025-10-07
OSV
CVE-2023-53638: In the Linux kernel, the following vulnerability has been resolved: octeon_ep: cancel queued works in probe error path If it fails to get the devices'2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: octeon_ep: cancel queued works in probe error path2025-10-07
Debian
CVE-2023-53638: linux - In the Linux kernel, the following vulnerability has been resolved: octeon_ep: ...2023