-

CVE-2023-53867

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix potential use-after-free bug when trimming caps

When trimming the caps and just after the 'session->s_cap_lock' is
released in ceph_iterate_session_caps() the cap maybe removed by
another thread, and when using the stale cap memory in the callbacks
it will trigger use-after-free crash.

We need to check the existence of the cap just after the 'ci->i_ceph_lock'
being acquired. And do nothing if it's already removed.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 2b2515b8095cf2149bef44383a99d5b5677f1831
Version 2f2dc053404febedc9c273452d9d518fb31fde72
Status affected
Version < 448875a73e16ba7d81dec9274ce9d33a12d092fb
Version 2f2dc053404febedc9c273452d9d518fb31fde72
Status affected
Version < ae6e935618d99cdba11eab4714092e7e5f13cf7e
Version 2f2dc053404febedc9c273452d9d518fb31fde72
Status affected
Version < aaf67de78807c59c35bafb5003d4fb457c764800
Version 2f2dc053404febedc9c273452d9d518fb31fde72
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.34
Status affected
Version < 2.6.34
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.064
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.