-
CVE-2023-53867
- EPSS 0.03%
- Veröffentlicht 24.12.2025 10:55:25
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
ceph: fix potential use-after-free bug when trimming caps
In the Linux kernel, the following vulnerability has been resolved: ceph: fix potential use-after-free bug when trimming caps When trimming the caps and just after the 'session->s_cap_lock' is released in ceph_iterate_session_caps() the cap maybe removed by another thread, and when using the stale cap memory in the callbacks it will trigger use-after-free crash. We need to check the existence of the cap just after the 'ci->i_ceph_lock' being acquired. And do nothing if it's already removed.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
2f2dc053404febedc9c273452d9d518fb31fde72
Version <
2b2515b8095cf2149bef44383a99d5b5677f1831
Status
affected
Version
2f2dc053404febedc9c273452d9d518fb31fde72
Version <
448875a73e16ba7d81dec9274ce9d33a12d092fb
Status
affected
Version
2f2dc053404febedc9c273452d9d518fb31fde72
Version <
ae6e935618d99cdba11eab4714092e7e5f13cf7e
Status
affected
Version
2f2dc053404febedc9c273452d9d518fb31fde72
Version <
aaf67de78807c59c35bafb5003d4fb457c764800
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.34
Status
affected
Version
0
Version <
2.6.34
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|