CVE-2023-54258
Use-After-Free Race Condition in Linux Kernel CIFS Oplock Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential kernel oops in the Linux kernel's CIFS module related to oplock breaks. Due to deferred close operations racing with lease breaks, the system may attempt to send a lease response after the session has been unmounted, leading to invalid memory access and a kernel crash. The fix involves changing the order of checks before sending the oplock response to ensure the open file list is empty first.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (oops) in the Linux system when using CIFS, potentially leading to system instability or denial of service due to improper handling of lease breaks and deferred closes.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the Linux kernel version that includes the fix for the cifs_oplock_break issue. The fix involves changing the ordering of checks before sending the oplock_response to first verify if the openFileList is empty, preventing race conditions that can cause kernel oops. Until patched, consider avoiding workloads that heavily use CIFS oplocks or deferred close features to reduce risk.