CVE-2023-54260
Description
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix lost destroy smbd connection when MR allocate failed
If the MR allocate failed, the smb direct connection info is NULL, then smbd_destroy() will directly return, then the connection info will be leaked.
Let's set the smb direct connection info to the server before call smbd_destroy().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in Linux kernel's CIFS client when SMB Direct MR allocation fails causes smbd connection info to be lost, but the fix ensures proper cleanup.
Vulnerability
Overview
CVE-2023-54260 describes a memory leak vulnerability in the Linux kernel's CIFS (Common Internet File System) client. The issue occurs in the SMB Direct (SMBD) connection handling code. When a memory region (MR) allocation fails during the connection setup, the SMBD connection info pointer becomes NULL. Subsequently, when smbd_destroy() is called, it returns early due to the NULL pointer, without actually freeing the connection info structure, resulting in a memory leak. [1][2]
Exploitation and
Root Cause
The root cause is a missing assignment of the SMBD connection info to the server structure before invoking smbd_destroy(). Under normal conditions, smbd_destroy() cleans up the connection. However, if MR allocation fails, the connection info pointer is not properly saved, so the cleanup routine cannot access it. No special privileges or network position beyond regular CIFS usage is required to trigger this code path—any user or process that triggers CIFS SMB Direct connections with failing MR allocations can cause the leak.
Impact
An attacker who can repeatedly trigger the affected code path (e.g., by initiating CIFS mounts that experience MR allocation failures) can exhaust kernel memory over time. This may lead to denial of service (DoS) conditions, impacting system stability and availability. The leak does not directly allow arbitrary code execution or privilege escalation.
Mitigation
The fix, committed to the Linux kernel stable tree, ensures that the SMBD connection info is assigned to the server structure before calling smbd_destroy(), regardless of whether MR allocation succeeds or fails. Users should update their kernel to include commit caac205e0d5b44c4c23a10c6c0976d50ebe16ac2 (or equivalent backport). No workaround is available apart from avoiding the use of SMB Direct connections or applying the kernel patch. [3]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
7d303e2588712324c0c34fff1caac205e0d5b46cd6c639cddc51ae01104b304b7e13b8a13e9d3401d95d6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/04b7e13b8a13264282f874db5378fc3d3253cfacnvd
- git.kernel.org/stable/c/324c0c34fff1affd436e509325cb46739209704envd
- git.kernel.org/stable/c/46cd6c639cddba2bd2d810ceb16bb20374ad75b0nvd
- git.kernel.org/stable/c/c51ae01104b318bf15f3c5097faba5c72addba7anvd
- git.kernel.org/stable/c/caac205e0d5b44c4c23a10c6c0976d50ebe16ac2nvd
- git.kernel.org/stable/c/d303e25887127364a6765eaf7ac68aa2bac518a9nvd
- git.kernel.org/stable/c/e9d3401d95d62a9531082cd2453ed42f2740e3fdnvd
News mentions
0No linked articles in our index yet.