CVE-2023-53572

In the Linux kernel, the following vulnerability has been resolved: clk: imx: scu: use _safe list iterator to avoid a use after free This loop is freeing "clk" so it needs to use list_for_each_entry_safe(). Otherwise it dereferences a freed variable to get the next item on the loop.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Feb 2026, 15:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/08cc7cd2c2a29a2abf5bceb8f048c0734d3694ba - () https://git.kernel.org/stable/c/08cc7cd2c2a29a2abf5bceb8f048c0734d3694ba - Patch
References () https://git.kernel.org/stable/c/0a719f0e4b6f233979e219baff73923e76a96e09 - () https://git.kernel.org/stable/c/0a719f0e4b6f233979e219baff73923e76a96e09 - Patch
References () https://git.kernel.org/stable/c/3d90921f91fc6a8c801d527bb5848c99e335c1cf - () https://git.kernel.org/stable/c/3d90921f91fc6a8c801d527bb5848c99e335c1cf - Patch
References () https://git.kernel.org/stable/c/632c60ecd25dbacee54d5581fe3aeb834b57010a - () https://git.kernel.org/stable/c/632c60ecd25dbacee54d5581fe3aeb834b57010a - Patch
References () https://git.kernel.org/stable/c/f95ff838ac39f861d1f95a0f3bbb1e01c2517d79 - () https://git.kernel.org/stable/c/f95ff838ac39f861d1f95a0f3bbb1e01c2517d79 - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-02-06 15:02


NVD link : CVE-2023-53572

Mitre link : CVE-2023-53572

CVE.ORG link : CVE-2023-53572


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free