CVE-2023-53316
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/09/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/msm/dp: Free resources after unregistering them<br />
<br />
The DP component&#39;s unbind operation walks through the submodules to<br />
unregister and clean things up. But if the unbind happens because the DP<br />
controller itself is being removed, all the memory for those submodules<br />
has just been freed.<br />
<br />
Change the order of these operations to avoid the many use-after-free<br />
that otherwise happens in this code path.<br />
<br />
Patchwork: https://patchwork.freedesktop.org/patch/542166/
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.188 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.121 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.3.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.4.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3c3f3d35f5e05c468b048eb42a4f8c62c6655692
- https://git.kernel.org/stable/c/4e9f1a2367aea7d61f6781213e25313cd983b0d7
- https://git.kernel.org/stable/c/5c3278db06e332fdc14f3f297499fb88ded264d2
- https://git.kernel.org/stable/c/c67a55f7cc8d767d624235bf1bcd0947e56abe0f
- https://git.kernel.org/stable/c/ca47d0dc00968358c136a1847cfed550cedfd1b5
- https://git.kernel.org/stable/c/fa0048a4b1fa7a50c8b0e514f5b428abdf69a6f8



