CVE-2023-53867
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ceph: fix potential use-after-free bug when trimming caps<br />
<br />
When trimming the caps and just after the &#39;session->s_cap_lock&#39; is<br />
released in ceph_iterate_session_caps() the cap maybe removed by<br />
another thread, and when using the stale cap memory in the callbacks<br />
it will trigger use-after-free crash.<br />
<br />
We need to check the existence of the cap just after the &#39;ci->i_ceph_lock&#39;<br />
being acquired. And do nothing if it&#39;s already removed.



