Home

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we have a possible use-after-free which can cause hard to debug problems later on. This was revealed during stress testing with KASAN enabled kernel. Fixing it by moving the cfile free call to a few lines below, after the usage.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-18 | Updated 2025-09-18 | Assigner Linux

Product status

Default status
unaffected

76894f3e2f71177747b8b4763fb180e800279585 (git) before 4fe07d55a5461e66a55fbefb57f85ff0facea32b
affected

76894f3e2f71177747b8b4763fb180e800279585 (git) before b6353518ef8180816e863aa23b06456f395404d6
affected

76894f3e2f71177747b8b4763fb180e800279585 (git) before d017880782cf71f8820ee4a2002843893176501d
affected

76894f3e2f71177747b8b4763fb180e800279585 (git) before 33f736187d08f6bc822117629f263b97d3df4165
affected

2d046892a493d9760c35fdaefc3017f27f91b621 (git)
affected

Default status
affected

6.1
affected

Any version before 6.1
unaffected

6.1.39 (semver)
unaffected

6.3.13 (semver)
unaffected

6.4.4 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/4fe07d55a5461e66a55fbefb57f85ff0facea32b

git.kernel.org/...c/b6353518ef8180816e863aa23b06456f395404d6

git.kernel.org/...c/d017880782cf71f8820ee4a2002843893176501d

git.kernel.org/...c/33f736187d08f6bc822117629f263b97d3df4165

cve.org (CVE-2023-53377)

nvd.nist.gov (CVE-2023-53377)

Download JSON