CVE-2023-53106

In the Linux kernel, the following vulnerability has been resolved: nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition This bug influences both st_nci_i2c_remove and st_nci_spi_remove. Take st_nci_i2c_remove as an example. In st_nci_i2c_probe, it called ndlc_probe and bound &ndlc->sm_work with llt_ndlc_sm_work. When it calls ndlc_recv or timeout handler, it will finally call schedule_work to start the work. When we call st_nci_i2c_remove to remove the driver, there may be a sequence as follows: Fix it by finishing the work before cleanup in ndlc_remove CPU0 CPU1 |llt_ndlc_sm_work st_nci_i2c_remove | ndlc_remove | st_nci_remove | nci_free_device| kfree(ndev) | //free ndlc->ndev | |llt_ndlc_rcv_queue |nci_recv_frame |//use ndlc->ndev
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*

History

10 Nov 2025, 17:54

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-416
References () https://git.kernel.org/stable/c/2156490c4b7cacda9a18ec99929940b8376dc0e3 - () https://git.kernel.org/stable/c/2156490c4b7cacda9a18ec99929940b8376dc0e3 - Patch
References () https://git.kernel.org/stable/c/3405eb641dafcc8b28d174784b203c1622c121bf - () https://git.kernel.org/stable/c/3405eb641dafcc8b28d174784b203c1622c121bf - Patch
References () https://git.kernel.org/stable/c/43aa468df246175207a7d5d7d6d31b231f15b49c - () https://git.kernel.org/stable/c/43aa468df246175207a7d5d7d6d31b231f15b49c - Patch
References () https://git.kernel.org/stable/c/5000fe6c27827a61d8250a7e4a1d26c3298ef4f6 - () https://git.kernel.org/stable/c/5000fe6c27827a61d8250a7e4a1d26c3298ef4f6 - Patch
References () https://git.kernel.org/stable/c/5e331022b448fbc5e76f24349cd0246844dcad25 - () https://git.kernel.org/stable/c/5e331022b448fbc5e76f24349cd0246844dcad25 - Patch
References () https://git.kernel.org/stable/c/84dd9cc34014e3a3dcce0eb6d54b8a067e97676b - () https://git.kernel.org/stable/c/84dd9cc34014e3a3dcce0eb6d54b8a067e97676b - Patch
References () https://git.kernel.org/stable/c/b0c202a8dc63008205a5d546559736507a9aae66 - () https://git.kernel.org/stable/c/b0c202a8dc63008205a5d546559736507a9aae66 - Patch
References () https://git.kernel.org/stable/c/f589e5b56c562d99ea74e05b1c3f0eab78aa17a3 - () https://git.kernel.org/stable/c/f589e5b56c562d99ea74e05b1c3f0eab78aa17a3 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

Information

Published : 2025-05-02 16:15

Updated : 2025-11-10 17:54


NVD link : CVE-2023-53106

Mitre link : CVE-2023-53106

CVE.ORG link : CVE-2023-53106


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free