In the Linux kernel, the following vulnerability has been resolved:
ksmbd: call rcu_barrier() in ksmbd_server_exit()
racy issue is triggered the bug by racing between closing a connection
and rmmod. In ksmbd, rcu_barrier() is not called at module unload time,
so nothing prevents ksmbd from getting unloaded while it still has RCU
callbacks pending. It leads to trigger unintended execution of kernel
code locally and use to defeat protections such as Kernel Lockdown
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: call rcu_barrier() in ksmbd_server_exit() racy issue is triggered the bug by racing between closing a connection and rmmod. In ksmbd, rcu_barrier() is not called at module unload time, so nothing prevents ksmbd from getting unloaded while it still has RCU callbacks pending. It leads to trigger unintended execution of kernel code locally and use to defeat protections such as Kernel Lockdown | |
Title | ksmbd: call rcu_barrier() in ksmbd_server_exit() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-08-16T13:22:09.212Z
Updated: 2025-08-16T13:22:09.212Z
Reserved: 2023-05-05T10:00:07.894Z
Link: CVE-2023-32246

No data.

Status : Received
Published: 2025-08-16T14:15:26.393
Modified: 2025-08-16T14:15:26.393
Link: CVE-2023-32246

No data.