VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-53997

CVE-2023-53997

Description

In the Linux kernel, the following vulnerability has been resolved:

thermal: of: fix double-free on unregistration

Since commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal zone parameters structure"), thermal_zone_device_register() allocates a copy of the tzp argument and frees it when unregistering, so thermal_of_zone_register() now ends up leaking its original tzp and double-freeing the tzp copy. Fix this by locating tzp on stack instead.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A double-free vulnerability in the Linux kernel's thermal subsystem occurs when unregistering a thermal zone due to a copy of the tzp parameter being freed twice.

Vulnerability

Overview

In the Linux kernel, a double-free vulnerability exists in the thermal subsystem's device registration and unregistration path. The issue stems from commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal zone parameters structure"), which modified thermal_zone_device_register() to allocate a copy of the tzp (thermal zone parameters) argument and free that copy upon unregistration. However, thermal_of_zone_register() was not updated accordingly, causing it to leak its original tzp allocation and then double-free the copy made by the core function [1].

Exploitation and

Impact

An attacker with the ability to trigger thermal zone registration and unregistration (e.g., through device hotplug or module loading) could exploit this double-free to corrupt kernel memory. The double-free can lead to use-after-free conditions, potentially allowing privilege escalation or denial of service. No authentication is required if the attacker can control the thermal device lifecycle from userspace or through hardware events [1].

Mitigation

The fix, committed in kernel stable tree, moves the tzp variable to the stack in thermal_of_zone_register() to avoid the double allocation and subsequent double-free. Users should apply the patch from the stable kernel repository [1]. No workaround is available; updating the kernel is recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.