CVE-2023-53867

Published: Dic 24, 2025 Last Modified: Dic 29, 2025
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix potential use-after-free bug when trimming caps

When trimming the caps and just after the 'session->s_cap_lock' is
released in ceph_iterate_session_caps() the cap maybe removed by
another thread, and when using the stale cap memory in the callbacks
it will trigger use-after-free crash.

We need to check the existence of the cap just after the 'ci->i_ceph_lock'
being acquired. And do nothing if it's already removed.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0002
Percentile
0,1th
Updated

EPSS Score Trend (Last 83 Days)

https://git.kernel.org/stable/c/2b2515b8095cf2149bef44383a99d5b5677f1831
https://git.kernel.org/stable/c/448875a73e16ba7d81dec9274ce9d33a12d092fb
https://git.kernel.org/stable/c/aaf67de78807c59c35bafb5003d4fb457c764800
https://git.kernel.org/stable/c/ae6e935618d99cdba11eab4714092e7e5f13cf7e