CVE-2023-53377
cifs: prevent use-after-free by freeing the cfile later
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we have a possible use-after-free which can cause hard to debug problems later on. This was revealed during stress testing with KASAN enabled kernel. Fixing it by moving the cfile free call to a few lines below, after the usage.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 18, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
76894f3e2f71177747b8b4763fb180e800279585 < 4fe07d55a5461e66a55fbefb57f85ff0facea32b 76894f3e2f71177747b8b4763fb180e800279585 < b6353518ef8180816e863aa23b06456f395404d6 76894f3e2f71177747b8b4763fb180e800279585 < d017880782cf71f8820ee4a2002843893176501d 76894f3e2f71177747b8b4763fb180e800279585 < 33f736187d08f6bc822117629f263b97d3df4165 2d046892a493d9760c35fdaefc3017f27f91b621
Linux / Linux
6.1
References
git.kernel.org: https://git.kernel.org/stable/c/4fe07d55a5461e66a55fbefb57f85ff0facea32b git.kernel.org: https://git.kernel.org/stable/c/b6353518ef8180816e863aa23b06456f395404d6 git.kernel.org: https://git.kernel.org/stable/c/d017880782cf71f8820ee4a2002843893176501d git.kernel.org: https://git.kernel.org/stable/c/33f736187d08f6bc822117629f263b97d3df4165