In the Linux kernel, the following vulnerability has been resolved:
nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
This bug influences both st_nci_i2c_remove and st_nci_spi_remove.
Take st_nci_i2c_remove as an example.
In st_nci_i2c_probe, it called ndlc_probe and bound &ndlc->sm_work
with llt_ndlc_sm_work.
When it calls ndlc_recv or timeout handler, it will finally call
schedule_work to start the work.
When we call st_nci_i2c_remove to remove the driver, there
may be a sequence as follows:
Fix it by finishing the work before cleanup in ndlc_remove
CPU0 CPU1
|llt_ndlc_sm_work
st_nci_i2c_remove |
ndlc_remove |
st_nci_remove |
nci_free_device|
kfree(ndev) |
//free ndlc->ndev |
|llt_ndlc_rcv_queue
|nci_recv_frame
|//use ndlc->ndev
References
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/2156490c4b7cacda9a18ec99929940b8376dc0e3 - Patch | |
| References | () https://git.kernel.org/stable/c/3405eb641dafcc8b28d174784b203c1622c121bf - Patch | |
| References | () https://git.kernel.org/stable/c/43aa468df246175207a7d5d7d6d31b231f15b49c - Patch | |
| References | () https://git.kernel.org/stable/c/5000fe6c27827a61d8250a7e4a1d26c3298ef4f6 - Patch | |
| References | () https://git.kernel.org/stable/c/5e331022b448fbc5e76f24349cd0246844dcad25 - Patch | |
| References | () https://git.kernel.org/stable/c/84dd9cc34014e3a3dcce0eb6d54b8a067e97676b - Patch | |
| References | () https://git.kernel.org/stable/c/b0c202a8dc63008205a5d546559736507a9aae66 - Patch | |
| References | () https://git.kernel.org/stable/c/f589e5b56c562d99ea74e05b1c3f0eab78aa17a3 - Patch | |
| First Time |
Linux
Linux linux Kernel |
05 May 2025, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-02 16:15
Updated : 2025-11-10 17:54
NVD link : CVE-2023-53106
Mitre link : CVE-2023-53106
CVE.ORG link : CVE-2023-53106
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
