CVE-2023-5345
HIGHLinux Kernel < 6.1.56 - Use After Free
Title source: ruleDescription
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
Exploits (1)
References (6)
Scores
CVSS v3
7.8
EPSS
0.0003
EPSS Percentile
7.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-416
Status
published
Products (5)
fedoraproject/fedora
37
fedoraproject/fedora
38
fedoraproject/fedora
39
linux/linux_kernel
6.6 rc1 (3 CPE variants)
linux/linux_kernel
6.0.16 - 6.1.56
Published
Oct 03, 2023
Tracked Since
Feb 18, 2026