๐Ÿ” CVE Alert

CVE-2023-53377

HIGH 7.8

cifs: prevent use-after-free by freeing the cfile later

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we have a possible use-after-free which can cause hard to debug problems later on. This was revealed during stress testing with KASAN enabled kernel. Fixing it by moving the cfile free call to a few lines below, after the usage.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
76894f3e2f71177747b8b4763fb180e800279585 < 4fe07d55a5461e66a55fbefb57f85ff0facea32b 76894f3e2f71177747b8b4763fb180e800279585 < b6353518ef8180816e863aa23b06456f395404d6 76894f3e2f71177747b8b4763fb180e800279585 < d017880782cf71f8820ee4a2002843893176501d 76894f3e2f71177747b8b4763fb180e800279585 < 33f736187d08f6bc822117629f263b97d3df4165 2d046892a493d9760c35fdaefc3017f27f91b621
Linux / Linux
6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4fe07d55a5461e66a55fbefb57f85ff0facea32b git.kernel.org: https://git.kernel.org/stable/c/b6353518ef8180816e863aa23b06456f395404d6 git.kernel.org: https://git.kernel.org/stable/c/d017880782cf71f8820ee4a2002843893176501d git.kernel.org: https://git.kernel.org/stable/c/33f736187d08f6bc822117629f263b97d3df4165