{"uuid": "ca6078cc-ce34-4668-871f-97f7a128c36b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53116", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14735", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53116\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target -&gt;queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call.\n\ud83d\udccf Published: 2025-05-02T15:55:54.858Z\n\ud83d\udccf Modified: 2025-05-04T07:50:10.667Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1\n2. https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e\n3. https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083\n4. https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a\n5. https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642\n6. https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9\n7. https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a\n8. https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286", "creation_timestamp": "2025-05-04T08:17:58.000000Z"}