CVE-2023-54193 — Use After Free in Linux
Severity
5.6MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_api: remove block_cb from driver_list before freeing
Error handler of tcf_block_bind() frees the whole bo->cb_list on error.
However, by that time the flow_block_cb instances are already in the driver
list because driver ndo_setup_tc() callback is called before that up the
call chain in tcf_block_offload_cmd(). This leaves dangling pointers to
freed objects in the list and causes use-after-free[0]. Fix it by als…
Affected Packages4 packages
▶CVEListV5linux/linux59094b1e5094c7e50a3d2912202fd30b6a1dadf8 — cc5fe387c6294d0471cb7ed064efac97fac65ccc+7
🔴Vulnerability Details
3OSV▶
CVE-2023-54193: In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: remove block_cb from driver_list before freeing Error handler↗2025-12-30
GHSA▶
GHSA-w7r9-4gjq-hqm4: In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_api: remove block_cb from driver_list before freeing
Error handle↗2025-12-30