CVE-2023-53039
Linux Kernel vulnerability analysis and mitigation

Overview

A use-after-free vulnerability was discovered in the Linux kernel's Intel ISH HID driver (CVE-2023-53039). The issue occurs when a reset notify IPC message is received, where the ISR schedules a work function and passes the ISHTP device via a global pointer ishtp_dev (NVD, Debian Tracker).

Technical details

The vulnerability manifests when ishprobe() fails, causing the devm-managed device resources including ishtpdev to be freed, but the work is not cancelled. This leads to a use-after-free condition when the work function attempts to access the freed ishtp_dev pointer. The issue has been assigned a CVSS v3.1 base score of 5.5 with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Red Hat).

Impact

The vulnerability could lead to system instability or potential denial of service when exploited, as indicated by the CVSS metrics showing high availability impact but no confidentiality or integrity impacts (Red Hat).

Mitigation and workarounds

The vulnerability has been fixed by implementing devmworkautocancel() to ensure the work is automatically cancelled if probe fails. Fixed versions are available in various Linux distributions: Debian bookworm (6.1.137-1), trixie, and sid (6.12.27-1) contain the fix, while older versions remain vulnerable (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management