๐Ÿ” CVE Alert

CVE-2025-40039

UNKNOWN 0.0

ksmbd: Fix race condition in RPC handle list access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix race condition in RPC handle list access The 'sess->rpc_handle_list' XArray manages RPC handles within a ksmbd session. Access to this list is intended to be protected by 'sess->rpc_lock' (an rw_semaphore). However, the locking implementation was flawed, leading to potential race conditions. In ksmbd_session_rpc_open(), the code incorrectly acquired only a read lock before calling xa_store() and xa_erase(). Since these operations modify the XArray structure, a write lock is required to ensure exclusive access and prevent data corruption from concurrent modifications. Furthermore, ksmbd_session_rpc_method() accessed the list using xa_load() without holding any lock at all. This could lead to reading inconsistent data or a potential use-after-free if an entry is concurrently removed and the pointer is dereferenced. Fix these issues by: 1. Using down_write() and up_write() in ksmbd_session_rpc_open() to ensure exclusive access during XArray modification, and ensuring the lock is correctly released on error paths. 2. Adding down_read() and up_read() in ksmbd_session_rpc_method() to safely protect the lookup.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 28, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a4348710a7267705b75692dc1a000920481d1d92 < 69674b029002b1d90b655f014bdf64f404efa54d b685757c7b08d5073046fb379be965fd6c06aafc < 6b615a8fb3af0baf8126cde3d4fee97d57222ffc b685757c7b08d5073046fb379be965fd6c06aafc < 5cc679ba0f4505936124cd4179ba66bb0a4bd9f3 b685757c7b08d5073046fb379be965fd6c06aafc < 6bd7e0e55dcea2cf0d391bbc21c2eb069b4be3e1 b685757c7b08d5073046fb379be965fd6c06aafc < 305853cce379407090a73b38c5de5ba748893aee 1f485b54d04a920723984062c912174330a05178 052b41ef2abe274f068e892aee81406f11bd1f3a
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/69674b029002b1d90b655f014bdf64f404efa54d git.kernel.org: https://git.kernel.org/stable/c/6b615a8fb3af0baf8126cde3d4fee97d57222ffc git.kernel.org: https://git.kernel.org/stable/c/5cc679ba0f4505936124cd4179ba66bb0a4bd9f3 git.kernel.org: https://git.kernel.org/stable/c/6bd7e0e55dcea2cf0d391bbc21c2eb069b4be3e1 git.kernel.org: https://git.kernel.org/stable/c/305853cce379407090a73b38c5de5ba748893aee