In the Linux kernel, the following vulnerability has been resolved:
nvmet: avoid potential UAF in nvmet_req_complete()
An nvme target ->queue_response() operation implementation may free the
request passed as argument. Such implementation potentially could result
in a use after free of the request pointer when percpu_ref_put() is
called in nvmet_req_complete().
Avoid such problem by using a local variable to save the sq pointer
before calling __nvmet_req_complete(), thus avoiding dereferencing the
req pointer after that function call.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-02 16:15
Updated : 2025-11-10 17:52
NVD link : CVE-2023-53116
Mitre link : CVE-2023-53116
CVE.ORG link : CVE-2023-53116
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
