CVE-2023-53751Expired Pointer Dereference in Linux

Severity
7.1HIGH
No vector
EPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname TCP_Server_Info::hostname may be updated once or many times during reconnect, so protect its access outside reconnect path as well and then prevent any potential use-after-free bugs.

Affected Packages4 packages

Linuxlinux/linux_kernel5.0.06.1.28+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux93d5cb517db39e8af8d1292f9e785e4983b7f70864d62ac6d6514cba1305bd08e271ec1843bdd612+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-7gp2-6wc7-fw9f: In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname TCP_Server_2025-12-08
OSV
CVE-2023-53751: In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname TCP_Server_In2025-12-08
OSV
cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname2025-12-08

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service2025-12-08
Debian
CVE-2023-53751: linux - In the Linux kernel, the following vulnerability has been resolved: cifs: fix p...2023