A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3711-1 | linux-5.10 security update |
Debian DSA |
DSA-5594-1 | linux security update |
EUVD |
EUVD-2023-57515 | A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation. |
Ubuntu USN |
USN-6497-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6534-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6534-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6534-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6536-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6537-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6548-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6548-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6548-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6549-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6549-2 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-6549-3 | Linux kernel (Low Latency) vulnerabilities |
Ubuntu USN |
USN-6548-4 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-6548-5 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-6549-4 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6549-5 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6573-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6635-1 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
References
History
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Sep 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T21:01:35.551Z
Reserved: 2023-09-25T16:38:10.637Z
Link: CVE-2023-5178
No data.
Status : Modified
Published: 2023-11-01T17:15:11.920
Modified: 2024-11-21T08:41:14.480
Link: CVE-2023-5178
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN