First published: Tue Oct 03 2023(Updated: )
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. In this flaw, a malicious user can cause a UAF and a double free, which may lead to RCE (may also lead to an LPE in case the attacker already has local privileges). Reference: <a href="https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/">https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
IBM Security Guardium | <=12.0 | |
Linux Linux kernel | >=5.0<5.4.260 | |
Linux Linux kernel | >=5.5<5.10.199 | |
Linux Linux kernel | >=5.11<5.15.137 | |
Linux Linux kernel | >=5.16<6.1.60 | |
Linux Linux kernel | >=6.2<6.5.9 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Solidfire \& Hci Management Node | ||
Netapp Solidfire \& Hci Storage Node | ||
redhat/Kernel | <6.6 | 6.6 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5178 is a use-after-free vulnerability in the Linux NVMe-oF/TCP Driver.
The severity of CVE-2023-5178 is high with a CVSS score of 8.8.
CVE-2023-5178 may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution.
The affected software includes Linux kernel versions up to 6.6, Linux kernel version 6.6-rc1 to 6.6-rc6, Redhat Kernel version 6.6, Redhat Enterprise Linux version 8.0, and Redhat Enterprise Linux version 9.0.
To fix CVE-2023-5178, update to Linux kernel version 6.6 or later, or update to a patched version of Redhat Kernel or Redhat Enterprise Linux.