CVE-2023-1192
Summary
| CVE | CVE-2023-1192 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-11-01 20:15:00 UTC |
| Updated | 2023-11-09 15:24:00 UTC |
| Description | A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| cve-details |
MISC |
access.redhat.com |
|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
|
| 2154178 – (CVE-2023-1192) CVE-2023-1192 kernel: use-after-free in smb2_is_status_io_timeout() |
MISC |
bugzilla.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161208 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7549)
- 161236 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-13047)
- 161256 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7749)
- 242516 Red Hat Update for kernel (RHSA-2023:7549)
- 242521 Red Hat Update for kernel security (RHSA-2023:7539)
- 242526 Red Hat Update for kernel-rt (RHSA-2023:7548)
- 242575 Red Hat Update for kernel (RHSA-2023:7749)
- 242830 Red Hat Update for kernel-rt (RHSA-2024:0563)
- 242831 Red Hat Update for kernel (RHSA-2024:0562)
- 242845 Red Hat Update for kernel (RHSA-2024:0448)
- 242846 Red Hat Update for kernel-rt (RHSA-2024:0439)
- 242855 Red Hat Update for kernel (RHSA-2024:0412)
- 243050 Red Hat Update for kernel (RHSA-2024:1250)
- 243062 Red Hat Update for kernel-rt (RHSA-2024:1306)
- 755043 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3988-1)
- 755060 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4031-1)
- 755061 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4030-1)
- 755063 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4032-1)
- 755082 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4058-1)
- 755083 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4057-1)
- 755085 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-1)
- 755086 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4071-1)
- 755096 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4093-1)
- 755107 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4095-1)
- 755229 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-2)
- 755565 SUSE Security Update for the linux kernel (SUSE-SU-2023:4347-1)
- 907637 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (31853-1)
- 941482 AlmaLinux Security Update for kernel (ALSA-2023:7549)
- 961087 Rocky Linux Security Update for kernel-rt (RLSA-2023:7548)
- 961089 Rocky Linux Security Update for kernel (RLSA-2023:7549)