vulnerability
Ubuntu: (CVE-2023-54269): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Jan 2, 2026 | Jan 6, 2026 | Jan 7, 2026 |
Description
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: double free xprt_ctxt while still in use When an RPC request is deferred, the rq_xprt_ctxt pointer is moved out of the svc_rqst into the svc_deferred_req. When the deferred request is revisited, the pointer is copied into the new svc_rqst - and also remains in the svc_deferred_req. In the (rare?) case that the request is deferred a second time, the old svc_deferred_req is reused - it still has all the correct content. However in that case the rq_xprt_ctxt pointer is NOT cleared so that when xpo_release_xprt is called, the ctxt is freed (UDP) or possible added to a free list (RDMA). When the deferred request is revisited for a second time, it will reference this ctxt which may be invalid, and the free the object a second time which is likely to oops. So change svc_defer() to *always* clear rq_xprt_ctxt, and assert that the value is now stored in the svc_deferred_req.
Solutions
References
- CVE-2023-54269
- https://attackerkb.com/topics/CVE-2023-54269
- URL-https://git.kernel.org/linus/eb8d3a2c809abd73ab0a060fe971d6b9019aa3c1
- URL-https://git.kernel.org/stable/c/7851771789e87108a92697194105ef0c9307dc5e
- URL-https://git.kernel.org/stable/c/e0c648627322a4c7e018e5c7f837c3c03e297dbb
- URL-https://git.kernel.org/stable/c/eb8d3a2c809abd73ab0a060fe971d6b9019aa3c1
- URL-https://git.kernel.org/stable/c/fd86534872f445f54dc01e7db001e25eadf063a8
- URL-https://www.cve.org/CVERecord?id=CVE-2023-54269
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.