CVE-2023-53794
cifs: fix session state check in reconnect to avoid use-after-free issue
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: cifs: fix session state check in reconnect to avoid use-after-free issue Don't collect exiting session in smb2_reconnect_server(), because it will be released soon. Note that the exiting session will stay in server->smb_ses_list until it complete the cifs_free_ipc() and logoff() and then delete itself from the list.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 9, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
4fcd1813e6404dd4420c7d12fb483f9320f0bf93 < 7e4f5c3f01fb0e51ca438e43262d858daf9a0a76 4fcd1813e6404dd4420c7d12fb483f9320f0bf93 < 759ffc164d95a32c09528766d74d9b4fb054e8f4 4fcd1813e6404dd4420c7d12fb483f9320f0bf93 < 99f280700b4cc02d5f141b8d15f8e9fad0418f65 655e0c067f0e02ece03fd0591dabe3db2ae27552 875cc09c0767a4ac06b57af383709657f98b3ea1 599fe1409085059ba12a2c3897c853be9fa9e7cf 2e4378ee60049b752c9dce16f62ce6fbd11b379a 59b520454b323ec43b2ae757217332cea33091e0 e20c888e2b3576e5f498c167729d274ef60b86f8 4ce7aa4e44d88ce64ea8ae2337b8910f3670b0ba 419fad68e4c4135ff9859e9214dd6cf954413ca1
Linux / Linux
4.7