{"vulnerability": "CVE-2023-53138", "sightings": [{"uuid": "1eaa6cc4-3264-4cd3-84b5-e7fc2ec5939f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53138", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lo7c2ovetek2", "content": "", "creation_timestamp": "2025-05-02T17:34:20.863033Z"}, {"uuid": "442d1375-003a-4813-a846-9a13f6822e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53138", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo7mr5ypde2h", "content": "", "creation_timestamp": "2025-05-02T20:06:16.567521Z"}, {"uuid": "5d83c7bc-7409-47cc-b569-84fa25aa5818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53138", "type": "seen", "source": "https://t.me/cvedetector/24360", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-53138 - Cisco CAIF Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-53138 \nPublished : May 2, 2025, 4:15 p.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: caif: Fix use-after-free in cfusbl_device_notify()  \n  \nsyzbot reported use-after-free in cfusbl_device_notify() [1].  This  \ncauses a stack trace like below:  \n  \nBUG: KASAN: use-after-free in cfusbl_device_notify+0x7c9/0x870 net/caif/caif_usb.c:138  \nRead of size 8 at addr ffff88807ac4e6f0 by task kworker/u4:6/1214  \n  \nCPU: 0 PID: 1214 Comm: kworker/u4:6 Not tainted 5.19.0-rc3-syzkaller-00146-g92f20ff72066 #0  \nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011  \nWorkqueue: netns cleanup_net  \nCall Trace:  \n   \n __dump_stack lib/dump_stack.c:88 [inline]  \n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106  \n print_address_description.constprop.0.cold+0xeb/0x467 mm/kasan/report.c:313  \n print_report mm/kasan/report.c:429 [inline]  \n kasan_report.cold+0xf4/0x1c6 mm/kasan/report.c:491  \n cfusbl_device_notify+0x7c9/0x870 net/caif/caif_usb.c:138  \n notifier_call_chain+0xb5/0x200 kernel/notifier.c:87  \n call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:1945  \n call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]  \n call_netdevice_notifiers net/core/dev.c:1997 [inline]  \n netdev_wait_allrefs_any net/core/dev.c:10227 [inline]  \n netdev_run_todo+0xbc0/0x10f0 net/core/dev.c:10341  \n default_device_exit_batch+0x44e/0x590 net/core/dev.c:11334  \n ops_exit_list+0x125/0x170 net/core/net_namespace.c:167  \n cleanup_net+0x4ea/0xb00 net/core/net_namespace.c:594  \n process_one_work+0x996/0x1610 kernel/workqueue.c:2289  \n worker_thread+0x665/0x1080 kernel/workqueue.c:2436  \n kthread+0x2e9/0x3a0 kernel/kthread.c:376  \n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302  \n   \n  \nWhen unregistering a net device, unregister_netdevice_many_notify()  \nsets the device's reg_state to NETREG_UNREGISTERING, calls notifiers  \nwith NETDEV_UNREGISTER, and adds the device to the todo list.  \n  \nLater on, devices in the todo list are processed by netdev_run_todo().  \nnetdev_run_todo() waits devices' reference count become 1 while  \nrebdoadcasting NETDEV_UNREGISTER notification.  \n  \nWhen cfusbl_device_notify() is called with NETDEV_UNREGISTER multiple  \ntimes, the parent device might be freed.  This could cause UAF.  \nProcessing NETDEV_UNREGISTER multiple times also causes inbalance of  \nreference count for the module.  \n  \nThis patch fixes the issue by accepting only first NETDEV_UNREGISTER  \nnotification. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T20:07:47.000000Z"}]}