{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T20:36:12.698","vulnerabilities":[{"cve":{"id":"CVE-2023-54280","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-30T13:16:16.970","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential race when tree connecting ipc\n\nProtect access of TCP_Server_Info::hostname when building the ipc tree\nname as it might get freed in cifsd thread and thus causing an\nuse-after-free bug in __tree_connect_dfs_target().  Also, while at it,\nupdate status of IPC tcon on success and then avoid any extra tree\nconnects."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\ncifs: corregir una posible condición de carrera al conectar el árbol ipc\n\nProteger el acceso a TCP_Server_Info::hostname al construir el nombre del árbol ipc, ya que podría ser liberado en el hilo cifsd y así causar un error de uso después de liberación en __tree_connect_dfs_target(). Además, ya que estamos en ello, actualizar el estado de IPC tcon en caso de éxito y luego evitar cualquier conexión de árbol adicional."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/536ec71ba060a02fabe8e22cecb82fe7b3a8708b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/553476df55a111e6a66ad9155256aec0ec1b7ad0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/ee20d7c6100752eaf2409d783f4f1449c29ea33d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}