CVE-2023-5178

8.8 HIGH
Published: November 01, 2023 Modified: February 18, 2026
View on NVD

Description

A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7370
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7379
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7418
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7548
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7549
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7551
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7554
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7557
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7559
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0340
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0378
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0386
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0412
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0431
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0432
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0461
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0554
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0575
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:1268
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:1269
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:1278
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-5178
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/
Source: secalert@redhat.com
Mailing List Patch Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7370
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7379
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7418
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7548
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7549
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7551
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7554
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7557
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:7559
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0340
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0378
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0386
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0412
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0431
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0432
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0461
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0554
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:0575
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:1268
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:1269
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:1278
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-5178
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Vendor Advisory
https://security.netapp.com/advisory/ntap-20231208-0004/
Source: af854a3a-2127-422b-91ae-364da2661108

50 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
8.4%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

netapp linux redhat