CVE-2023-53116

Source
https://cve.org/CVERecord?id=CVE-2023-53116
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53116.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53116
Downstream
Related
Published
2025-05-02T15:55:54.858Z
Modified
2026-03-09T23:52:31.483662Z
Summary
nvmet: avoid potential UAF in nvmet_req_complete()
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet: avoid potential UAF in nvmetreqcomplete()

An nvme target ->queueresponse() operation implementation may free the request passed as argument. Such implementation potentially could result in a use after free of the request pointer when percpurefput() is called in nvmetreq_complete().

Avoid such problem by using a local variable to save the sq pointer before calling __nvmetreqcomplete(), thus avoiding dereferencing the req pointer after that function call.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53116.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a07b4970f464f13640e28e16dad6cfa33647cc99
Fixed
e5d99b29012bbf0e86929403209723b2806500c1
Fixed
fafcb4b26393870c45462f9af6a48e581dbbcf7e
Fixed
04c394208831d5e0d5cfee46722eb0f033cd4083
Fixed
a6317235da8aa7cb97529ebc8121cc2a4c4c437a
Fixed
f1d5888a5efe345b63c430b256e95acb0a475642
Fixed
bcd535f07c58342302a2cd2bdd8894fe0872c8a9
Fixed
8ed9813871038b25a934b21ab76b5b7dbf44fc3a
Fixed
6173a77b7e9d3e202bdb9897b23f2a8afe7bf286

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53116.json"