CVE-2023-53747 — Use After Free in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF
After a call to console_unlock() in vcs_write() the vc_data struct can be
freed by vc_port_destruct(). Because of that, the struct vc_data pointer
must be reloaded in the while loop in vcs_write() after console_lock() to
avoid a UAF when vcs_size() is called.
Syzkaller reported a UAF in vcs_size().
BUG: KASAN: slab-use-after-free in vcs_size (driver…
Affected Packages4 packages
▶CVEListV5linux/linuxac751efa6a0d70f2c9daef5c7e3a92270f5c2dff — 934de9a9b659785fed3e820bc0c813a460c71fea+8
🔴Vulnerability Details
3GHSA▶
GHSA-286m-g766-wcgx: In the Linux kernel, the following vulnerability has been resolved:
vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF
Aft↗2025-12-08
OSV▶
CVE-2023-53747: In the Linux kernel, the following vulnerability has been resolved: vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF After↗2025-12-08