CVE-2023-53597
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/10/2025
Última modificación:
06/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cifs: fix mid leak during reconnection after timeout threshold<br />
<br />
When the number of responses with status of STATUS_IO_TIMEOUT<br />
exceeds a specified threshold (NUM_STATUS_IO_TIMEOUT), we reconnect<br />
the connection. But we do not return the mid, or the credits<br />
returned for the mid, or reduce the number of in-flight requests.<br />
<br />
This bug could result in the server->in_flight count to go bad,<br />
and also cause a leak in the mids.<br />
<br />
This change moves the check to a few lines below where the<br />
response is decrypted, even of the response is read from the<br />
transform header. This way, the code for returning the mids<br />
can be reused.<br />
<br />
Also, the cifs_reconnect was reconnecting just the transport<br />
connection before. In case of multi-channel, this may not be<br />
what we want to do after several timeouts. Changed that to<br />
reconnect the session and the tree too.<br />
<br />
Also renamed NUM_STATUS_IO_TIMEOUT to a more appropriate name<br />
MAX_STATUS_IO_TIMEOUT.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9.5 (incluyendo) | 5.15.150 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.42 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.4.7 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



