Home

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix missed ses refcounting Use new cifs_smb_ses_inc_refcount() helper to get an active reference of @ses and @ses->dfs_root_ses (if set). This will prevent @ses->dfs_root_ses of being put in the next call to cifs_put_smb_ses() and thus potentially causing an use-after-free bug.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

8e3554150d6c80a84b3cb046615d1a0e943811dc (git) before eb382196e6f6e05cfafdab797840e5a96c6e7bf0
affected

8e3554150d6c80a84b3cb046615d1a0e943811dc (git) before bf99f6be2d20146942bce6f9e90a0ceef12cbc1e
affected

f30d226bcc9f0e2d97b4a6e94c43a28148fbeab6 (git)
affected

c082c3be0f96e759ff2e361d929832fda0b93851 (git)
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

6.4.7 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/eb382196e6f6e05cfafdab797840e5a96c6e7bf0

git.kernel.org/...c/bf99f6be2d20146942bce6f9e90a0ceef12cbc1e

cve.org (CVE-2023-54076)

nvd.nist.gov (CVE-2023-54076)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.