SB20251226125 - Use-after-free in Linux kernel soc xilinx driver
Published: December 26, 2025 Updated: December 31, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-54101)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xlnx_remove_cb_for_suspend() and xlnx_remove_cb_for_notify_event() functions in drivers/soc/xilinx/xlnx_event_manager.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/256aace3a5d8c987183ba4832dffb36f48ea7d3b
- https://git.kernel.org/stable/c/49fca83f6f3f0cafe5bf5b43e8ee81cf73c2d5e0
- https://git.kernel.org/stable/c/c58da0ba3e5c86e51e2c1557afaf6f71e00c4533
- https://git.kernel.org/stable/c/f16599e638073ef0b2828bb64f5e99138e9381b5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.13