In the Linux kernel, the following vulnerability has been resolved:
nvmet: avoid potential UAF in nvmet_req_complete()
An nvme target ->queue_response() operation implementation may free the
request passed as argument. Such implementation potentially could result
in a use after free of the request pointer when percpu_ref_put() is
called in nvmet_req_complete().
Avoid such problem by using a local variable to save the sq pointer
before calling __nvmet_req_complete(), thus avoiding dereferencing the
req pointer after that function call.
Metrics
Affected Vendors & Products
References
History
Mon, 05 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: nvmet: avoid potential UAF in nvmet_req_complete() An nvme target ->queue_response() operation implementation may free the request passed as argument. Such implementation potentially could result in a use after free of the request pointer when percpu_ref_put() is called in nvmet_req_complete(). Avoid such problem by using a local variable to save the sq pointer before calling __nvmet_req_complete(), thus avoiding dereferencing the req pointer after that function call. | |
Title | nvmet: avoid potential UAF in nvmet_req_complete() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-02T15:55:54.858Z
Updated: 2025-05-04T07:50:10.667Z
Reserved: 2025-05-02T15:51:43.554Z
Link: CVE-2023-53116

No data.

Status : Awaiting Analysis
Published: 2025-05-02T16:15:30.680
Modified: 2025-05-05T20:54:19.760
Link: CVE-2023-53116
