In the Linux kernel, the following vulnerability has been resolved:
clk: microchip: fix potential UAF in auxdev release callback
Similar to commit 1c11289b34ab ("peci: cpu: Fix use-after-free in
adev_release()"), the auxiliary device is not torn down in the correct
order. If auxiliary_device_add() fails, the release callback will be
called twice, resulting in a UAF. Due to timing, the auxdev code in this
driver "took inspiration" from the aforementioned commit, and thus its
bugs too!
Moving auxiliary_device_uninit() to the unregister callback instead
avoids the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential UAF in auxdev release callback Similar to commit 1c11289b34ab ("peci: cpu: Fix use-after-free in adev_release()"), the auxiliary device is not torn down in the correct order. If auxiliary_device_add() fails, the release callback will be called twice, resulting in a UAF. Due to timing, the auxdev code in this driver "took inspiration" from the aforementioned commit, and thus its bugs too! Moving auxiliary_device_uninit() to the unregister callback instead avoids the issue. | |
Title | clk: microchip: fix potential UAF in auxdev release callback | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-07T15:19:37.655Z
Reserved: 2025-10-07T15:16:59.657Z
Link: CVE-2023-53636

No data.

Status : Received
Published: 2025-10-07T16:15:46.763
Modified: 2025-10-07T16:15:46.763
Link: CVE-2023-53636

No data.

No data.