{"id":"CVE-2023-5178","details":"A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.","modified":"2026-03-15T22:47:48.107382Z","published":"2023-11-01T17:15:11.920Z","related":["ALSA-2023:7549","MGASA-2023-0328","MGASA-2023-0331","SUSE-SU-2023:4343-1","SUSE-SU-2023:4345-1","SUSE-SU-2023:4351-1","SUSE-SU-2023:4375-1","SUSE-SU-2023:4378-1","SUSE-SU-2023:4414-1","SUSE-SU-2024:0331-1","SUSE-SU-2024:0348-1","SUSE-SU-2024:0352-1","SUSE-SU-2024:0378-1","SUSE-SU-2024:0395-1","SUSE-SU-2024:0414-1","SUSE-SU-2024:0421-1","USN-6537-1","USN-6573-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7418"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7559"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0554"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0386"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0432"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1278"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-5178"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231208-0004/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7548"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7549"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7554"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0340"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7551"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7557"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0461"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0378"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241924"},{"type":"FIX","url":"https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.0"},{"fixed":"5.4.260"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.199"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.137"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.60"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.5.9"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-5178.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}