In the Linux kernel, the following vulnerability has been resolved:
rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails
If getting an ID or setting up a work queue in rbd_dev_create() fails,
use-after-free on rbd_dev->rbd_client, rbd_dev->spec and rbd_dev->opts
is triggered in do_rbd_add(). The root cause is that the ownership of
these structures is transfered to rbd_dev prematurely and they all end
up getting freed when rbd_dev_create() calls rbd_dev_free() prior to
returning to do_rbd_add().
Found by Linux Verification Center (linuxtesting.org) with SVACE, an
incomplete patch submitted by Natalia Petrova <n.petrova@fintech.ru>.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-09-16 17:15
Updated : 2026-01-14 19:16
NVD link : CVE-2023-53307
Mitre link : CVE-2023-53307
CVE.ORG link : CVE-2023-53307
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
