CVE-2023-53849
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a workqueue leak in the Linux kernel's drm/msm component that occurs on bind errors. Specifically, when there are early errors during the binding process of a subcomponent, the workqueue is not properly destroyed, leading to a resource leak. The fix ensures that the workqueue is explicitly destroyed even if binding fails early.
How can this vulnerability impact me? :
The impact of this vulnerability is a resource leak in the Linux kernel, which could lead to increased memory usage or system instability over time if the workqueue is not properly cleaned up during bind errors.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the workqueue leak in the drm/msm component of the Linux kernel. This involves updating the kernel to a version that includes the fix for the workqueue leak on bind errors as described in the patchwork link: https://patchwork.freedesktop.org/patch/525093/. Ensuring your system is running an updated kernel version that includes this fix is the immediate mitigation step.