vulnerability
Ubuntu: (CVE-2023-53316): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Sep 17, 2025 | Sep 19, 2025 | Dec 3, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Sep 17, 2025
Added
Sep 19, 2025
Modified
Dec 3, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Free resources after unregistering them The DP component's unbind operation walks through the submodules to unregister and clean things up. But if the unbind happens because the DP controller itself is being removed, all the memory for those submodules has just been freed. Change the order of these operations to avoid the many use-after-free that otherwise happens in this code path. Patchwork: https://patchwork.freedesktop.org/patch/542166/
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-15ubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-15ubuntu-upgrade-linux-gkeubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-ibm-5-15ubuntu-upgrade-linux-intel-iot-realtimeubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-nvidiaubuntu-upgrade-linux-nvidia-tegraubuntu-upgrade-linux-nvidia-tegra-5-15ubuntu-upgrade-linux-nvidia-tegra-igxubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-15ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-riscv-5-15ubuntu-upgrade-linux-xilinx-zynqmp
References
- CVE-2023-53316
- https://attackerkb.com/topics/CVE-2023-53316
- CWE-416
- URL-https://git.kernel.org/linus/fa0048a4b1fa7a50c8b0e514f5b428abdf69a6f8
- URL-https://git.kernel.org/stable/c/3c3f3d35f5e05c468b048eb42a4f8c62c6655692
- URL-https://git.kernel.org/stable/c/4e9f1a2367aea7d61f6781213e25313cd983b0d7
- URL-https://git.kernel.org/stable/c/5c3278db06e332fdc14f3f297499fb88ded264d2
- URL-https://git.kernel.org/stable/c/c67a55f7cc8d767d624235bf1bcd0947e56abe0f
- URL-https://git.kernel.org/stable/c/ca47d0dc00968358c136a1847cfed550cedfd1b5
- URL-https://git.kernel.org/stable/c/fa0048a4b1fa7a50c8b0e514f5b428abdf69a6f8
- URL-https://www.cve.org/CVERecord?id=CVE-2023-53316
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.