vulnerability
Ubuntu: (CVE-2023-53106): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:M/Au:S/C:N/I:C/A:C) | May 2, 2025 | May 8, 2025 | Jun 12, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
This bug influences both st_nci_i2c_remove and st_nci_spi_remove.
Take st_nci_i2c_remove as an example.
In st_nci_i2c_probe, it called ndlc_probe and bound &ndlc->sm_work
with llt_ndlc_sm_work.
When it calls ndlc_recv or timeout handler, it will finally call
schedule_work to start the work.
When we call st_nci_i2c_remove to remove the driver, there
may be a sequence as follows:
Fix it by finishing the work before cleanup in ndlc_remove
CPU0 CPU1
|llt_ndlc_sm_work
st_nci_i2c_remove |
ndlc_remove |
st_nci_remove |
nci_free_device|
kfree(ndev) |
//free ndlc->ndev |
|llt_ndlc_rcv_queue
|nci_recv_frame
|//use ndlc->ndev
Solution(s)
References
- CVE-2023-53106
- https://attackerkb.com/topics/CVE-2023-53106
- URL-https://git.kernel.org/linus/5000fe6c27827a61d8250a7e4a1d26c3298ef4f6
- URL-https://git.kernel.org/stable/c/2156490c4b7cacda9a18ec99929940b8376dc0e3
- URL-https://git.kernel.org/stable/c/3405eb641dafcc8b28d174784b203c1622c121bf
- URL-https://git.kernel.org/stable/c/43aa468df246175207a7d5d7d6d31b231f15b49c
- URL-https://git.kernel.org/stable/c/5000fe6c27827a61d8250a7e4a1d26c3298ef4f6
- URL-https://git.kernel.org/stable/c/5e331022b448fbc5e76f24349cd0246844dcad25
- URL-https://git.kernel.org/stable/c/84dd9cc34014e3a3dcce0eb6d54b8a067e97676b
- URL-https://git.kernel.org/stable/c/b0c202a8dc63008205a5d546559736507a9aae66
- URL-https://git.kernel.org/stable/c/f589e5b56c562d99ea74e05b1c3f0eab78aa17a3
- URL-https://www.cve.org/CVERecord?id=CVE-2023-53106

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.