CVE-2023-1192Use After Free in Kernel

CWE-416Use After Free7 documents7 sources
Severity
6.5MEDIUMNVD
EPSS
0.0%
top 92.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 1
Latest updateNov 14

Description

A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

Debianlinux/linux_kernel< 6.1.64-1+2

Also affects: Enterprise Linux 8.0, 9.0

🔴Vulnerability Details

3
OSV
CVE-2023-1192: A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel2023-11-01
CVEList
Use-after-free in smb2_is_status_io_timeout()2023-11-01
GHSA
GHSA-r277-j8m2-3x97: A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel2023-11-01

📋Vendor Advisories

3
Microsoft
Use-after-free in smb2_is_status_io_timeout()2023-11-14
Debian
CVE-2023-1192: linux - A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Li...2023
Red Hat
kernel: use-after-free in smb2_is_status_io_timeout()2022-10-02
CVE-2023-1192 — Use After Free in Linux Kernel | cvebase