In the Linux kernel, the following vulnerability has been resolved:
ksmbd: call rcu_barrier() in ksmbd_server_exit()
racy issue is triggered the bug by racing between closing a connection
and rmmod. In ksmbd, rcu_barrier() is not called at module unload time,
so nothing prevents ksmbd from getting unloaded while it still has RCU
callbacks pending. It leads to trigger unintended execution of kernel
code locally and use to defeat protections such as Kernel Lockdown
References
Configurations
Configuration 1 (hide)
|
History
18 Nov 2025, 18:10
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/5a7090ccc242ab009ee7769e9d7fad6644dbe9bd - Patch | |
| References | () https://git.kernel.org/stable/c/b80422474ffe44cb5e813cd6da1f1c6bc50fd9d2 - Patch | |
| References | () https://git.kernel.org/stable/c/c053e389db0d892e2ff5a60ec5e533b976503795 - Patch | |
| References | () https://git.kernel.org/stable/c/d4174505016a3b2996eb7ff1530dcabbf15d47b6 - Patch | |
| References | () https://git.kernel.org/stable/c/eb307d09fe15844fdaebeb8cc8c9b9e925430aa5 - Patch |
Information
Published : 2025-08-16 14:15
Updated : 2025-11-18 18:10
NVD link : CVE-2023-32246
Mitre link : CVE-2023-32246
CVE.ORG link : CVE-2023-32246
JSON object : View
Products Affected
linux
- linux_kernel
CWE
