CVE-2023-32246

In the Linux kernel, the following vulnerability has been resolved: ksmbd: call rcu_barrier() in ksmbd_server_exit() racy issue is triggered the bug by racing between closing a connection and rmmod. In ksmbd, rcu_barrier() is not called at module unload time, so nothing prevents ksmbd from getting unloaded while it still has RCU callbacks pending. It leads to trigger unintended execution of kernel code locally and use to defeat protections such as Kernel Lockdown
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Nov 2025, 18:10

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/5a7090ccc242ab009ee7769e9d7fad6644dbe9bd - () https://git.kernel.org/stable/c/5a7090ccc242ab009ee7769e9d7fad6644dbe9bd - Patch
References () https://git.kernel.org/stable/c/b80422474ffe44cb5e813cd6da1f1c6bc50fd9d2 - () https://git.kernel.org/stable/c/b80422474ffe44cb5e813cd6da1f1c6bc50fd9d2 - Patch
References () https://git.kernel.org/stable/c/c053e389db0d892e2ff5a60ec5e533b976503795 - () https://git.kernel.org/stable/c/c053e389db0d892e2ff5a60ec5e533b976503795 - Patch
References () https://git.kernel.org/stable/c/d4174505016a3b2996eb7ff1530dcabbf15d47b6 - () https://git.kernel.org/stable/c/d4174505016a3b2996eb7ff1530dcabbf15d47b6 - Patch
References () https://git.kernel.org/stable/c/eb307d09fe15844fdaebeb8cc8c9b9e925430aa5 - () https://git.kernel.org/stable/c/eb307d09fe15844fdaebeb8cc8c9b9e925430aa5 - Patch

Information

Published : 2025-08-16 14:15

Updated : 2025-11-18 18:10


NVD link : CVE-2023-32246

Mitre link : CVE-2023-32246

CVE.ORG link : CVE-2023-32246


JSON object : View

Products Affected

linux

  • linux_kernel