CVE-2023-53039

Source
https://cve.org/CVERecord?id=CVE-2023-53039
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53039.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53039
Downstream
Related
Published
2025-05-02T15:54:57.876Z
Modified
2026-03-20T12:32:55.813488Z
Summary
HID: intel-ish-hid: ipc: Fix potential use-after-free in work function
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: ipc: Fix potential use-after-free in work function

When a reset notify IPC message is received, the ISR schedules a work function and passes the ISHTP device to it via a global pointer ishtpdev. If ishprobe() fails, the devm-managed device resources including ishtpdev are freed, but the work is not cancelled, causing a use-after-free when the work function tries to access ishtpdev. Use devmworkautocancel() instead, so that the work is automatically cancelled if probe fails.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53039.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ae02e5d40d5f829c589412c6253f925e35cf7a22
Fixed
8c1d378b8c224fd50247625255f09fc01dcc5836
Fixed
0a594cb490ca6232671fc09e2dc1a0fc7ccbb0b5
Fixed
d3ce3afd9f791dd1b7daedfcf8c396b60af5dec0
Fixed
8ae2f2b0a28416ed2f6d8478ac8b9f7862f36785

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53039.json"