-
CVE-2023-53636
- EPSS 0.02%
- Published 07.10.2025 15:19:37
- Last modified 07.10.2025 16:15:46
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential UAF in auxdev release callback Similar to commit 1c11289b34ab ("peci: cpu: Fix use-after-free in adev_release()"), the auxiliary device is not torn down in the correct order. If auxiliary_device_add() fails, the release callback will be called twice, resulting in a UAF. Due to timing, the auxdev code in this driver "took inspiration" from the aforementioned commit, and thus its bugs too! Moving auxiliary_device_uninit() to the unregister callback instead avoids the issue.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
5b4052aa956e11bcd19e50ca559eb38dcb46201b
Version
b56bae2dd6fda6baf3bb74af3812676eebdd52f2
Status
affected
Version <
d7d6dacf39ed102d7667721ca1700022c9c8b11a
Version
b56bae2dd6fda6baf3bb74af3812676eebdd52f2
Status
affected
Version <
934406b2d42eaf3fc57f5546cc68ff7ab9680bb3
Version
b56bae2dd6fda6baf3bb74af3812676eebdd52f2
Status
affected
Version <
7455b7007b9e93bcc2bc9c1c6c73a228e3152069
Version
b56bae2dd6fda6baf3bb74af3812676eebdd52f2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.1
Status
affected
Version <
6.1
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.031 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|