CVE-2023-53106

Source
https://cve.org/CVERecord?id=CVE-2023-53106
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53106.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53106
Downstream
Related
Published
2025-05-02T15:55:47.501Z
Modified
2026-03-20T12:32:58.254461Z
Summary
nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
Details

In the Linux kernel, the following vulnerability has been resolved:

nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition

This bug influences both stncii2cremove and stncispiremove. Take stncii2c_remove as an example.

In stncii2cprobe, it called ndlcprobe and bound &ndlc->smwork with lltndlcsmwork.

When it calls ndlcrecv or timeout handler, it will finally call schedulework to start the work.

When we call stncii2c_remove to remove the driver, there may be a sequence as follows:

Fix it by finishing the work before cleanup in ndlc_remove

CPU0 CPU1

                |llt_ndlc_sm_work

stncii2cremove | ndlcremove | stnciremove | ncifreedevice| kfree(ndev) | //free ndlc->ndev | |lltndlcrcvqueue |ncirecv_frame |//use ndlc->ndev

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53106.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
35630df68d6030daf12dde12ed07bbe26324e6ac
Fixed
2156490c4b7cacda9a18ec99929940b8376dc0e3
Fixed
3405eb641dafcc8b28d174784b203c1622c121bf
Fixed
b0c202a8dc63008205a5d546559736507a9aae66
Fixed
43aa468df246175207a7d5d7d6d31b231f15b49c
Fixed
84dd9cc34014e3a3dcce0eb6d54b8a067e97676b
Fixed
5e331022b448fbc5e76f24349cd0246844dcad25
Fixed
f589e5b56c562d99ea74e05b1c3f0eab78aa17a3
Fixed
5000fe6c27827a61d8250a7e4a1d26c3298ef4f6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53106.json"