CVE-2023-53484
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a use-after-free issue in the cpu_rmap library. Specifically, when the function irq_set_affinity_notifier() is called with a NULL notify argument, it frees a pointer in an array but leaves the pointer itself in the array. Later, when free_irq_cpu_rmap() is called, it attempts to free the same pointer again, causing a use-after-free condition. The fix involves setting the array entry to NULL after freeing and checking for non-NULL entries before freeing to prevent double free.
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free condition in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited. However, the current code does not trigger this issue because the problematic function call sequence does not occur in practice.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the fixed version of the Linux kernel that addresses the use-after-free issue in the cpu_rmap library. Avoid calling irq_set_affinity_notifier() with a NULL notify argument followed by free_irq_cpu_rmap() until the fix is applied.