VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54280

CVE-2023-54280

Description

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential race when tree connecting ipc

Protect access of TCP_Server_Info::hostname when building the ipc tree name as it might get freed in cifsd thread and thus causing an use-after-free bug in __tree_connect_dfs_target(). Also, while at it, update status of IPC tcon on success and then avoid any extra tree connects.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free race in the Linux kernel's CIFS client when connecting IPC tree shares could allow an attacker to corrupt memory.

Vulnerability

A race condition exists in the Linux kernel's CIFS (Common Internet File System) client code, specifically in the function __tree_connect_dfs_target(). When building the IPC tree share name, the code accesses TCP_Server_Info::hostname without proper synchronization. This field can be freed concurrently by the cifsd kernel thread, leading to a use-after-free (UAF) bug [1][2].

Exploitation

An attacker who can trigger a tree connect to an IPC share (for example, by mounting a CIFS share and causing a DFS referral) may race the freeing of the server's hostname. The attack requires the attacker does not need local access; the vulnerability is triggered during normal CIFS operations. The race window is small but exploitable if the attacker can control timing.

Impact

Successful exploitation could allow an attacker to corrupt kernel memory, potentially leading to a denial of service (system crash) or, in more severe cases, arbitrary code execution in kernel context. The CIFS client is commonly used in enterprise environments for file sharing, making this a high-severity issue.

Mitigation

The fix, committed to the Linux kernel stable tree, adds proper locking (using rcu_read_lock/rcu_read_unlock) around the access to hostname and also updates the IPC tcon status on success to avoid extra tree connects [1][2]. Users should apply the latest stable kernel updates to remediate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.