CVE-2023-53597
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's CIFS implementation involves a leak of 'mids' (message IDs) during reconnection after a timeout threshold is exceeded. When too many responses return a STATUS_IO_TIMEOUT status, the connection is reconnected, but the system fails to properly return the mids or credits associated with them, and does not reduce the count of in-flight requests. This causes the server's in-flight request count to become incorrect and leads to a leak of mids. The fix involves adjusting where the check occurs in the code and improving the reconnection process to handle multi-channel sessions properly.
How can this vulnerability impact me? :
This vulnerability can cause resource leaks and incorrect tracking of in-flight requests in the CIFS connection, potentially leading to degraded performance, instability, or unexpected behavior in systems using CIFS on the Linux kernel. Over time, the leak of mids and incorrect request counts could affect the reliability of network file sharing sessions.