CVE-2023-5345

HIGH

Linux Kernel < 6.1.56 - Use After Free

Title source: rule

Description

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

Exploits (1)

gitlab WORKING POC
by aouadjaout · poc
https://gitlab.com/aouadjaout/cve-2023-5345

Scores

CVSS v3 7.8
EPSS 0.0003
EPSS Percentile 7.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-416
Status published
Products (5)
fedoraproject/fedora 37
fedoraproject/fedora 38
fedoraproject/fedora 39
linux/linux_kernel 6.6 rc1 (3 CPE variants)
linux/linux_kernel 6.0.16 - 6.1.56
Published Oct 03, 2023
Tracked Since Feb 18, 2026