-

CVE-2023-53377

In the Linux kernel, the following vulnerability has been resolved:

cifs: prevent use-after-free by freeing the cfile later

In smb2_compound_op we have a possible use-after-free
which can cause hard to debug problems later on.

This was revealed during stress testing with KASAN enabled
kernel. Fixing it by moving the cfile free call to
a few lines below, after the usage.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 4fe07d55a5461e66a55fbefb57f85ff0facea32b
Version 76894f3e2f71177747b8b4763fb180e800279585
Status affected
Version < b6353518ef8180816e863aa23b06456f395404d6
Version 76894f3e2f71177747b8b4763fb180e800279585
Status affected
Version < d017880782cf71f8820ee4a2002843893176501d
Version 76894f3e2f71177747b8b4763fb180e800279585
Status affected
Version < 33f736187d08f6bc822117629f263b97d3df4165
Version 76894f3e2f71177747b8b4763fb180e800279585
Status affected
Version 2d046892a493d9760c35fdaefc3017f27f91b621
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.1
Status affected
Version < 6.1
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.046
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string