Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-5345
HistoryOct 03, 2023 - 3:15 a.m.

Double free

2023-10-0303:15:00
PRIOn knowledge base
www.prio-n.com
10
linux kernel
use-after-free
vulnerability
smb/client
local privilege escalation
upgrade
nvd

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A use-after-free vulnerability in the Linux kernel’s fs/smb/client component can be exploited to achieve local privilege escalation.

In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.

We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.