CVE-2023-53794
Description
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix session state check in reconnect to avoid use-after-free issue
Don't collect exiting session in smb2_reconnect_server(), because it will be released soon.
Note that the exiting session will stay in server->smb_ses_list until it complete the cifs_free_ipc() and logoff() and then delete itself from the list.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in Linux kernel's CIFS client occurs when a session being torn down is collected during reconnect, allowing an attacker to trigger a race condition.
Root
Cause
The vulnerability resides in the Linux kernel's CIFS (Common Internet File System) client, specifically in the smb2_reconnect_server() function. The session state check fails to exclude sessions that are in the process of being torn down (exiting). These exiting sessions remain linked in server->smb_ses_list until they complete cifs_free_ipc() and logoff, creating a window where a dangling pointer can be dereferenced [1].
Exploitation
An attacker with the ability to trigger a network reconnection event on a CIFS mount can race the session teardown. No authentication is required beyond the existing mount credentials is required; the attacker must be able to cause a disconnect/reconnect (e.g., by network disruption or by sending a disconnect request). The race window is narrow but exists between the session being marked as exiting and its removal from the list [1].
Impact
Successful exploitation leads to a use-after-free condition, which can be leveraged to crash the system (denial of service) or, potentially, to achieve arbitrary code execution in kernel context. The CIFS is commonly used in enterprise environments for file sharing, making this a high-severity issue for affected systems.
Mitigation
The fix, committed to the Linux kernel stable tree, adds a check to skip sessions state check to skip exiting sessions during reconnect [1]. Users should apply the patch or update to a kernel version containing the fix. No workaround is available; the vulnerability is patched in the referenced commit.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
37e4f5c3f01fb759ffc164d9599f280700b4cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.