CVE-2023-54101Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe loop iterator to avoid a use after free The hash_for_each_possible() loop dereferences "eve_data" to get the next item on the list. However the loop frees eve_data so it leads to a use after free. Use hash_for_each_possible_safe() instead.

Affected Packages4 packages

Linuxlinux/linux_kernel5.17.06.1.39+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linuxc7fdb2404f66131bc9c22e06f71271728882648749fca83f6f3f0cafe5bf5b43e8ee81cf73c2d5e0+4
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
driver: soc: xilinx: use _safe loop iterator to avoid a use after free2025-12-24
OSV
CVE-2023-54101: In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe loop iterator to avoid a use after free The hash_fo2025-12-24
GHSA
GHSA-92ww-qwf4-vf35: In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe loop iterator to avoid a use after free The hash_2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: driver: soc: xilinx: use _safe loop iterator to avoid a use after free2025-12-24
Debian
CVE-2023-54101: linux - In the Linux kernel, the following vulnerability has been resolved: driver: soc...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54101 Impact, Exploitability, and Mitigation Steps | Wiz