CVE-2023-54280
Description
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix potential race when tree connecting ipc
Protect access of TCP_Server_Info::hostname when building the ipc tree name as it might get freed in cifsd thread and thus causing an use-after-free bug in __tree_connect_dfs_target(). Also, while at it, update status of IPC tcon on success and then avoid any extra tree connects.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free race in the Linux kernel's CIFS client when connecting IPC tree shares could allow an attacker to corrupt memory.
Vulnerability
A race condition exists in the Linux kernel's CIFS (Common Internet File System) client code, specifically in the function __tree_connect_dfs_target(). When building the IPC tree share name, the code accesses TCP_Server_Info::hostname without proper synchronization. This field can be freed concurrently by the cifsd kernel thread, leading to a use-after-free (UAF) bug [1][2].
Exploitation
An attacker who can trigger a tree connect to an IPC share (for example, by mounting a CIFS share and causing a DFS referral) may race the freeing of the server's hostname. The attack requires the attacker does not need local access; the vulnerability is triggered during normal CIFS operations. The race window is small but exploitable if the attacker can control timing.
Impact
Successful exploitation could allow an attacker to corrupt kernel memory, potentially leading to a denial of service (system crash) or, in more severe cases, arbitrary code execution in kernel context. The CIFS client is commonly used in enterprise environments for file sharing, making this a high-severity issue.
Mitigation
The fix, committed to the Linux kernel stable tree, adds proper locking (using rcu_read_lock/rcu_read_unlock) around the access to hostname and also updates the IPC tcon status on success to avoid extra tree connects [1][2]. Users should apply the latest stable kernel updates to remediate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3536ec71ba060553476df55a1ee20d7c61007Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.