VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54260

CVE-2023-54260

Description

In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix lost destroy smbd connection when MR allocate failed

If the MR allocate failed, the smb direct connection info is NULL, then smbd_destroy() will directly return, then the connection info will be leaked.

Let's set the smb direct connection info to the server before call smbd_destroy().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in Linux kernel's CIFS client when SMB Direct MR allocation fails causes smbd connection info to be lost, but the fix ensures proper cleanup.

Vulnerability

Overview

CVE-2023-54260 describes a memory leak vulnerability in the Linux kernel's CIFS (Common Internet File System) client. The issue occurs in the SMB Direct (SMBD) connection handling code. When a memory region (MR) allocation fails during the connection setup, the SMBD connection info pointer becomes NULL. Subsequently, when smbd_destroy() is called, it returns early due to the NULL pointer, without actually freeing the connection info structure, resulting in a memory leak. [1][2]

Exploitation and

Root Cause

The root cause is a missing assignment of the SMBD connection info to the server structure before invoking smbd_destroy(). Under normal conditions, smbd_destroy() cleans up the connection. However, if MR allocation fails, the connection info pointer is not properly saved, so the cleanup routine cannot access it. No special privileges or network position beyond regular CIFS usage is required to trigger this code path—any user or process that triggers CIFS SMB Direct connections with failing MR allocations can cause the leak.

Impact

An attacker who can repeatedly trigger the affected code path (e.g., by initiating CIFS mounts that experience MR allocation failures) can exhaust kernel memory over time. This may lead to denial of service (DoS) conditions, impacting system stability and availability. The leak does not directly allow arbitrary code execution or privilege escalation.

Mitigation

The fix, committed to the Linux kernel stable tree, ensures that the SMBD connection info is assigned to the server structure before calling smbd_destroy(), regardless of whether MR allocation succeeds or fails. Users should update their kernel to include commit caac205e0d5b44c4c23a10c6c0976d50ebe16ac2 (or equivalent backport). No workaround is available apart from avoiding the use of SMB Direct connections or applying the kernel patch. [3]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.