CVE-2023-53638

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
07/10/2025
Last modified:
03/02/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> octeon_ep: cancel queued works in probe error path<br /> <br /> If it fails to get the devices&amp;#39;s MAC address, octep_probe exits while<br /> leaving the delayed work intr_poll_task queued. When the work later<br /> runs, it&amp;#39;s a use after free.<br /> <br /> Move the cancelation of intr_poll_task from octep_remove into<br /> octep_device_cleanup. This does not change anything in the octep_remove<br /> flow, but octep_device_cleanup is called also in the octep_probe error<br /> path, where the cancelation is needed.<br /> <br /> Note that the cancelation of ctrl_mbox_task has to follow<br /> intr_poll_task&amp;#39;s, because the ctrl_mbox_task may be queued by<br /> intr_poll_task.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.4 (including) 6.4.12 (excluding)
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:*