VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2023-53751

CVE-2023-53751

Description

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname

TCP_Server_Info::hostname may be updated once or many times during reconnect, so protect its access outside reconnect path as well and then prevent any potential use-after-free bugs.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in the Linux kernel's CIFS client due to unsynchronized access to TCP_Server_Info::hostname during reconnection.

Vulnerability

Description

CVE-2023-53751 is a use-after-free vulnerability in the Linux kernel's CIFS (Common Internet File System) client. The root cause is that the TCP_Server_Info::hostname field can be updated multiple times during reconnection, but accesses to this field outside the reconnect path are not properly protected. This lack of synchronization can lead to a use-after-free condition when a concurrent access occurs while the hostname is being freed or reallocated [1][2].

Exploitation

An attacker would need to be able to trigger a CIFS reconnection event, which typically requires network-level access to disrupt the connection between the client and the SMB server. No special privileges on the client are necessary beyond the ability to mount a CIFS share. The race condition occurs when the hostname is accessed (e.g., for logging or connection management) while a reconnect is in progress, potentially allowing an attacker to exploit the freed memory [1][2].

Impact

Successful exploitation could allow an attacker to a use-after-free, which may lead to memory corruption, denial of service (system crash), or potentially arbitrary code execution in kernel context. The exact impact depends on the memory layout and the attacker's ability to control the freed memory [1][2].

Mitigation

The fix has been applied to the Linux kernel stable tree. Users should update to a kernel version containing the commit that adds proper locking around hostname accesses. No workaround is available other than applying the patch [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.