CVE-2023-53377Use After Free in Linux

CWE-416Use After Free5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we have a possible use-after-free which can cause hard to debug problems later on. This was revealed during stress testing with KASAN enabled kernel. Fixing it by moving the cfile free call to a few lines below, after the usage.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.0.166.1.39+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux76894f3e2f71177747b8b4763fb180e8002795854fe07d55a5461e66a55fbefb57f85ff0facea32b+5
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53377: In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we hav2025-09-18
GHSA
GHSA-2h3h-p2mp-rw5q: In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we h2025-09-18

📋Vendor Advisories

2
Red Hat
kernel: cifs: prevent use-after-free by freeing the cfile later2025-09-18
Debian
CVE-2023-53377: linux - In the Linux kernel, the following vulnerability has been resolved: cifs: preve...2023
CVE-2023-53377 — Use After Free in Linux | cvebase