Home

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: fix session state check in reconnect to avoid use-after-free issue Don't collect exiting session in smb2_reconnect_server(), because it will be released soon. Note that the exiting session will stay in server->smb_ses_list until it complete the cifs_free_ipc() and logoff() and then delete itself from the list.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-09 | Updated 2025-12-09 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7e4f5c3f01fb0e51ca438e43262d858daf9a0a76
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 759ffc164d95a32c09528766d74d9b4fb054e8f4
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 99f280700b4cc02d5f141b8d15f8e9fad0418f65
affected

Default status
affected

6.1.47 (semver)
unaffected

6.4.12 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/7e4f5c3f01fb0e51ca438e43262d858daf9a0a76

git.kernel.org/...c/759ffc164d95a32c09528766d74d9b4fb054e8f4

git.kernel.org/...c/99f280700b4cc02d5f141b8d15f8e9fad0418f65

cve.org (CVE-2023-53794)

nvd.nist.gov (CVE-2023-53794)

Download JSON