CVE-2023-53488

In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix possible panic during hotplug remove During hotplug remove it is possible that the update counters work might be pending, and may run after memory has been freed. Cancel the update counters work before freeing memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*

History

21 Jan 2026, 21:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/33c677d1e087e437c7dcaad8d73402cf6add282e - () https://git.kernel.org/stable/c/33c677d1e087e437c7dcaad8d73402cf6add282e - Patch
References () https://git.kernel.org/stable/c/4fdfaef71fced490835145631a795497646f4555 - () https://git.kernel.org/stable/c/4fdfaef71fced490835145631a795497646f4555 - Patch
References () https://git.kernel.org/stable/c/5e72f33ddfdb69cb21c1b59d31bbd3498d31b14a - () https://git.kernel.org/stable/c/5e72f33ddfdb69cb21c1b59d31bbd3498d31b14a - Patch
References () https://git.kernel.org/stable/c/918c1e6843b7e81d0e5cf7994f41f28dc34c98b0 - () https://git.kernel.org/stable/c/918c1e6843b7e81d0e5cf7994f41f28dc34c98b0 - Patch
References () https://git.kernel.org/stable/c/ac6640f4193d0f5b44269a7f08372909f9a18e5c - () https://git.kernel.org/stable/c/ac6640f4193d0f5b44269a7f08372909f9a18e5c - Patch
References () https://git.kernel.org/stable/c/bfd727ad8411995218f336ead9f2becfde7f3a89 - () https://git.kernel.org/stable/c/bfd727ad8411995218f336ead9f2becfde7f3a89 - Patch
References () https://git.kernel.org/stable/c/c2145b18740c7e697748e4005ce93a5c683c86a8 - () https://git.kernel.org/stable/c/c2145b18740c7e697748e4005ce93a5c683c86a8 - Patch
References () https://git.kernel.org/stable/c/d32a5e9b825d40c08a43dfbcba007159fed41a5d - () https://git.kernel.org/stable/c/d32a5e9b825d40c08a43dfbcba007159fed41a5d - Patch

01 Oct 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-01 12:15

Updated : 2026-01-21 21:26


NVD link : CVE-2023-53488

Mitre link : CVE-2023-53488

CVE.ORG link : CVE-2023-53488


JSON object : View

Products Affected

linux

  • linux_kernel