๐Ÿ” CVE Alert

CVE-2023-53106

UNKNOWN 0.0

nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition This bug influences both st_nci_i2c_remove and st_nci_spi_remove. Take st_nci_i2c_remove as an example. In st_nci_i2c_probe, it called ndlc_probe and bound &ndlc->sm_work with llt_ndlc_sm_work. When it calls ndlc_recv or timeout handler, it will finally call schedule_work to start the work. When we call st_nci_i2c_remove to remove the driver, there may be a sequence as follows: Fix it by finishing the work before cleanup in ndlc_remove CPU0 CPU1 |llt_ndlc_sm_work st_nci_i2c_remove | ndlc_remove | st_nci_remove | nci_free_device| kfree(ndev) | //free ndlc->ndev | |llt_ndlc_rcv_queue |nci_recv_frame |//use ndlc->ndev

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
35630df68d6030daf12dde12ed07bbe26324e6ac < 2156490c4b7cacda9a18ec99929940b8376dc0e3 35630df68d6030daf12dde12ed07bbe26324e6ac < 3405eb641dafcc8b28d174784b203c1622c121bf 35630df68d6030daf12dde12ed07bbe26324e6ac < b0c202a8dc63008205a5d546559736507a9aae66 35630df68d6030daf12dde12ed07bbe26324e6ac < 43aa468df246175207a7d5d7d6d31b231f15b49c 35630df68d6030daf12dde12ed07bbe26324e6ac < 84dd9cc34014e3a3dcce0eb6d54b8a067e97676b 35630df68d6030daf12dde12ed07bbe26324e6ac < 5e331022b448fbc5e76f24349cd0246844dcad25 35630df68d6030daf12dde12ed07bbe26324e6ac < f589e5b56c562d99ea74e05b1c3f0eab78aa17a3 35630df68d6030daf12dde12ed07bbe26324e6ac < 5000fe6c27827a61d8250a7e4a1d26c3298ef4f6
Linux / Linux
3.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2156490c4b7cacda9a18ec99929940b8376dc0e3 git.kernel.org: https://git.kernel.org/stable/c/3405eb641dafcc8b28d174784b203c1622c121bf git.kernel.org: https://git.kernel.org/stable/c/b0c202a8dc63008205a5d546559736507a9aae66 git.kernel.org: https://git.kernel.org/stable/c/43aa468df246175207a7d5d7d6d31b231f15b49c git.kernel.org: https://git.kernel.org/stable/c/84dd9cc34014e3a3dcce0eb6d54b8a067e97676b git.kernel.org: https://git.kernel.org/stable/c/5e331022b448fbc5e76f24349cd0246844dcad25 git.kernel.org: https://git.kernel.org/stable/c/f589e5b56c562d99ea74e05b1c3f0eab78aa17a3 git.kernel.org: https://git.kernel.org/stable/c/5000fe6c27827a61d8250a7e4a1d26c3298ef4f6