CVE-2023-54244
Use-After-Free in Linux ACPI EC Query Handler Causes Kernel Oops
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause a kernel oops, which is a crash of the Linux kernel. This can lead to system instability, unexpected reboots, or denial of service, especially if the affected module is unloaded while the EC query workqueue still references its handlers.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the ACPI EC query workqueue flushing fix has been applied. This prevents kernel oops caused by removing custom query handlers while they are still in use.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ACPI EC (Embedded Controller) subsystem. When custom query handlers are removed, the handler might still be used inside the EC query workqueue. If the module containing the callback function has already been unloaded, this can cause a kernel oops (a type of kernel crash). The issue is fixed by flushing the EC query workqueue when removing custom query handlers to ensure no references remain.