CVE-2023-53307

In the Linux kernel, the following vulnerability has been resolved: rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails If getting an ID or setting up a work queue in rbd_dev_create() fails, use-after-free on rbd_dev->rbd_client, rbd_dev->spec and rbd_dev->opts is triggered in do_rbd_add(). The root cause is that the ownership of these structures is transfered to rbd_dev prematurely and they all end up getting freed when rbd_dev_create() calls rbd_dev_free() prior to returning to do_rbd_add(). Found by Linux Verification Center (linuxtesting.org) with SVACE, an incomplete patch submitted by Natalia Petrova <n.petrova@fintech.ru>.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

01 Dec 2025, 21:46

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/71da2a151ed1adb0aea4252b16d81b53012e7afd - () https://git.kernel.org/stable/c/71da2a151ed1adb0aea4252b16d81b53012e7afd - Patch
References () https://git.kernel.org/stable/c/9787b328c42c13c4f31e7d5042c4e877e9344068 - () https://git.kernel.org/stable/c/9787b328c42c13c4f31e7d5042c4e877e9344068 - Patch
References () https://git.kernel.org/stable/c/a73783e4e0c4d1507794da211eeca75498544dff - () https://git.kernel.org/stable/c/a73783e4e0c4d1507794da211eeca75498544dff - Patch
References () https://git.kernel.org/stable/c/ae16346078b1189aee934afd872d9f3d0a682c33 - () https://git.kernel.org/stable/c/ae16346078b1189aee934afd872d9f3d0a682c33 - Patch
References () https://git.kernel.org/stable/c/cc8c0dd2984503ed09efa37bcafcef3d3da104e8 - () https://git.kernel.org/stable/c/cc8c0dd2984503ed09efa37bcafcef3d3da104e8 - Patch
References () https://git.kernel.org/stable/c/e3cbb4d60764295992c95344f2d779439e8b34ce - () https://git.kernel.org/stable/c/e3cbb4d60764295992c95344f2d779439e8b34ce - Patch
References () https://git.kernel.org/stable/c/f7c4d9b133c7a04ca619355574e96b6abf209fba - () https://git.kernel.org/stable/c/f7c4d9b133c7a04ca619355574e96b6abf209fba - Patch
References () https://git.kernel.org/stable/c/faa7b683e436664fff5648426950718277831348 - () https://git.kernel.org/stable/c/faa7b683e436664fff5648426950718277831348 - Patch
First Time Linux
Linux linux Kernel

16 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-16 17:15

Updated : 2025-12-01 21:46


NVD link : CVE-2023-53307

Mitre link : CVE-2023-53307

CVE.ORG link : CVE-2023-53307


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free