In the Linux kernel, the following vulnerability has been resolved:
RDMA/srp: Do not call scsi_done() from srp_abort()
After scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler
callback, it performs one of the following actions:
* Call scsi_queue_insert().
* Call scsi_finish_command().
* Call scsi_eh_scmd_add().
Hence, SCSI abort handlers must not call scsi_done(). Otherwise all
the above actions would trigger a use-after-free. Hence remove the
scsi_done() call from srp_abort(). Keep the srp_free_req() call
before returning SUCCESS because we may not see the command again if
SUCCESS is returned.
References
Configurations
Configuration 1 (hide)
|
History
11 Dec 2024, 16:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc - Patch | |
References | () https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a - Patch | |
References | () https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206 - Patch | |
References | () https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5 - Patch | |
References | () https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* |
|
CWE | CWE-416 | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc - | |
References | () https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a - | |
References | () https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206 - | |
References | () https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5 - | |
References | () https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb - |
02 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-02 22:15
Updated : 2024-12-11 16:41
NVD link : CVE-2023-52515
Mitre link : CVE-2023-52515
CVE.ORG link : CVE-2023-52515
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free