SB2025121073 - Use-after-free in Linux kernel block
Published: December 10, 2025 Updated: December 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53810)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the blk_complete_request(), blk_update_request() and blk_mq_submit_bio() functions in block/blk-mq.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/7d206ec7a04e8545828191b6ea8b49d3ea61391f
- https://git.kernel.org/stable/c/874bdf43b4a7dc5463c31508f62b3e42eb237b08
- https://git.kernel.org/stable/c/92d5d233b9ff531cf9cc36ab4251779e07adb633
- https://git.kernel.org/stable/c/9cd1e566676bbcb8a126acd921e4e194e6339603
- https://git.kernel.org/stable/c/b278570e2c59d538216f8b656e97680188a8fba4
- https://git.kernel.org/stable/c/d206f79d9cd658665b37ce8134c6ec849ac7af0c
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.111