CVE-2023-53867
Use-After-Free Vulnerability in Linux Kernel Ceph Caps Handling
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ceph | ceph | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's Ceph component. It occurs when trimming caps in the function ceph_iterate_session_caps(). After releasing the session's s_cap_lock, another thread may remove the cap, leading to the use of stale memory in callbacks, which can cause a crash. The fix involves checking if the cap still exists after acquiring the i_ceph_lock and doing nothing if the cap has already been removed.
How can this vulnerability impact me? :
This vulnerability can cause a use-after-free crash in the Ceph component of the Linux kernel, potentially leading to system instability or denial of service if exploited.