CVE-2023-53427
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.16 (inc) to 4.19.276 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.235 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.173 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.99 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's CIFS (Common Internet File System) component. It occurs when the MR (Memory Region) allocation fails, but the MR recovery work is not properly initialized and the MR list is not cleared. This leads to warnings and a use-after-free condition when the MR is released, potentially causing kernel crashes or instability.
How can this vulnerability impact me? :
The vulnerability can cause kernel warnings and use-after-free errors, which may lead to system instability, crashes, or potential denial of service when using CIFS mounts. This could affect the reliability and availability of systems relying on CIFS for network file sharing.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for warnings or errors related to the cifs module, specifically warnings about use-after-free (UAF) or MR list destruction failures. You can check the kernel log for such messages using commands like: dmesg | grep -i cifs or journalctl -k | grep -i cifs. Look for warnings similar to 'WARNING: CPU' or 'BUG: KASAN: use-after-free' related to cifs or mount.cifs processes.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by initializing the MR recovery work before MR allocation and removing MRs from the list to prevent use-after-free. Until an update is applied, avoid mounting CIFS shares using vulnerable kernel versions to prevent triggering the bug.