CVE-2023-53997
Description
In the Linux kernel, the following vulnerability has been resolved:
thermal: of: fix double-free on unregistration
Since commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal zone parameters structure"), thermal_zone_device_register() allocates a copy of the tzp argument and frees it when unregistering, so thermal_of_zone_register() now ends up leaking its original tzp and double-freeing the tzp copy. Fix this by locating tzp on stack instead.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A double-free vulnerability in the Linux kernel's thermal subsystem occurs when unregistering a thermal zone due to a copy of the tzp parameter being freed twice.
Vulnerability
Overview
In the Linux kernel, a double-free vulnerability exists in the thermal subsystem's device registration and unregistration path. The issue stems from commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal zone parameters structure"), which modified thermal_zone_device_register() to allocate a copy of the tzp (thermal zone parameters) argument and free that copy upon unregistration. However, thermal_of_zone_register() was not updated accordingly, causing it to leak its original tzp allocation and then double-free the copy made by the core function [1].
Exploitation and
Impact
An attacker with the ability to trigger thermal zone registration and unregistration (e.g., through device hotplug or module loading) could exploit this double-free to corrupt kernel memory. The double-free can lead to use-after-free conditions, potentially allowing privilege escalation or denial of service. No authentication is required if the attacker can control the thermal device lifecycle from userspace or through hardware events [1].
Mitigation
The fix, committed in kernel stable tree, moves the tzp variable to the stack in thermal_of_zone_register() to avoid the double allocation and subsequent double-free. Users should apply the patch from the stable kernel repository [1]. No workaround is available; updating the kernel is recommended.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
2adce49089412ac4436a5b20eVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.