CVE-2023-54101
driver: soc: xilinx: use _safe loop iterator to avoid a use after free
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
10th
In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe loop iterator to avoid a use after free The hash_for_each_possible() loop dereferences "eve_data" to get the next item on the list. However the loop frees eve_data so it leads to a use after free. Use hash_for_each_possible_safe() instead.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 24, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
c7fdb2404f66131bc9c22e06f712717288826487 < 49fca83f6f3f0cafe5bf5b43e8ee81cf73c2d5e0 c7fdb2404f66131bc9c22e06f712717288826487 < f16599e638073ef0b2828bb64f5e99138e9381b5 c7fdb2404f66131bc9c22e06f712717288826487 < 256aace3a5d8c987183ba4832dffb36f48ea7d3b c7fdb2404f66131bc9c22e06f712717288826487 < c58da0ba3e5c86e51e2c1557afaf6f71e00c4533
Linux / Linux
5.17
References
git.kernel.org: https://git.kernel.org/stable/c/49fca83f6f3f0cafe5bf5b43e8ee81cf73c2d5e0 git.kernel.org: https://git.kernel.org/stable/c/f16599e638073ef0b2828bb64f5e99138e9381b5 git.kernel.org: https://git.kernel.org/stable/c/256aace3a5d8c987183ba4832dffb36f48ea7d3b git.kernel.org: https://git.kernel.org/stable/c/c58da0ba3e5c86e51e2c1557afaf6f71e00c4533