{"id":"CVE-2023-53794","summary":"cifs: fix session state check in reconnect to avoid use-after-free issue","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix session state check in reconnect to avoid use-after-free issue\n\nDon't collect exiting session in smb2_reconnect_server(), because it\nwill be released soon.\n\nNote that the exiting session will stay in server-\u003esmb_ses_list until\nit complete the cifs_free_ipc() and logoff() and then delete itself\nfrom the list.","modified":"2026-04-15T08:14:25.513643123Z","published":"2025-12-09T00:00:51.061Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:0928-1","SUSE-SU-2026:0961-1","SUSE-SU-2026:1078-1","SUSE-SU-2026:1221-1","SUSE-SU-2026:1285-1","SUSE-SU-2026:1287-1","SUSE-SU-2026:1288-1","SUSE-SU-2026:1293-1","SUSE-SU-2026:1294-1","SUSE-SU-2026:1297-1","SUSE-SU-2026:1298-1","SUSE-SU-2026:1304-1","SUSE-SU-2026:1305-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53794.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/759ffc164d95a32c09528766d74d9b4fb054e8f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7e4f5c3f01fb0e51ca438e43262d858daf9a0a76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/99f280700b4cc02d5f141b8d15f8e9fad0418f65"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53794.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53794"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4fcd1813e6404dd4420c7d12fb483f9320f0bf93"},{"fixed":"7e4f5c3f01fb0e51ca438e43262d858daf9a0a76"},{"fixed":"759ffc164d95a32c09528766d74d9b4fb054e8f4"},{"fixed":"99f280700b4cc02d5f141b8d15f8e9fad0418f65"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"655e0c067f0e02ece03fd0591dabe3db2ae27552"},{"last_affected":"875cc09c0767a4ac06b57af383709657f98b3ea1"},{"last_affected":"599fe1409085059ba12a2c3897c853be9fa9e7cf"},{"last_affected":"2e4378ee60049b752c9dce16f62ce6fbd11b379a"},{"last_affected":"59b520454b323ec43b2ae757217332cea33091e0"},{"last_affected":"e20c888e2b3576e5f498c167729d274ef60b86f8"},{"last_affected":"4ce7aa4e44d88ce64ea8ae2337b8910f3670b0ba"},{"last_affected":"419fad68e4c4135ff9859e9214dd6cf954413ca1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53794.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.7.0"},{"fixed":"6.1.47"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.12"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53794.json"}}],"schema_version":"1.7.5"}