๐Ÿ” CVE Alert

CVE-2023-1192

MEDIUM 6.5

Use-after-free in smb2_is_status_io_timeout()

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.

CWE CWE-416
Vendor n/a
Product kernel
Published Nov 1, 2023
Last Updated Feb 27, 2025
Stay Ahead of the Next One

Get instant alerts for n/a kernel

Be the first to know when new medium vulnerabilities affecting n/a kernel are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

n/a / kernel
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Fedora / Fedora
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-1192 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2154178 git.kernel.org: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f

Credits

Red Hat would like to thank Pumpkin (@u1f383), working with DEVCORE Internship Program for reporting this issue.