A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.
In case of an error in smb3fscontextparseparam, ctx->password was freed but the field was not set to NULL which could lead to double free.
We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5345.json"
[
{
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_fs_context_parse_param"
},
"digest": {
"length": 14852.0,
"function_hash": "339491493466478952833271760536420317575"
},
"signature_type": "Function",
"id": "CVE-2023-5345-00e51843",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@e6e43b8aa7cd3c3af686caf0c2e11819a886d705",
"deprecated": false,
"signature_version": "v1"
},
{
"target": {
"file": "fs/smb/client/fs_context.c"
},
"digest": {
"line_hashes": [
"201638341877710866512876276326142325975",
"320063439156128142918262012217828197404",
"130791580139720984623790079680783559389",
"305649120289987018172890576406812809883"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2023-5345-7894d4fc",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@e6e43b8aa7cd3c3af686caf0c2e11819a886d705",
"deprecated": false,
"signature_version": "v1"
}
]