-
CVE-2023-53377
- EPSS 0.02%
- Veröffentlicht 18.09.2025 13:33:23
- Zuletzt bearbeitet 19.09.2025 16:00:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we have a possible use-after-free which can cause hard to debug problems later on. This was revealed during stress testing with KASAN enabled kernel. Fixing it by moving the cfile free call to a few lines below, after the usage.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
4fe07d55a5461e66a55fbefb57f85ff0facea32b
Version
76894f3e2f71177747b8b4763fb180e800279585
Status
affected
Version <
b6353518ef8180816e863aa23b06456f395404d6
Version
76894f3e2f71177747b8b4763fb180e800279585
Status
affected
Version <
d017880782cf71f8820ee4a2002843893176501d
Version
76894f3e2f71177747b8b4763fb180e800279585
Status
affected
Version <
33f736187d08f6bc822117629f263b97d3df4165
Version
76894f3e2f71177747b8b4763fb180e800279585
Status
affected
Version
2d046892a493d9760c35fdaefc3017f27f91b621
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.1
Status
affected
Version <
6.1
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.39
Status
unaffected
Version <=
6.3.*
Version
6.3.13
Status
unaffected
Version <=
6.4.*
Version
6.4.4
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.046 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|