Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-40090— ksmbd: fix recursive locking in RPC handle list access

EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-40090

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ksmbd: fix recursive locking in RPC handle list access
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix recursive locking in RPC handle list access Since commit 305853cce3794 ("ksmbd: Fix race condition in RPC handle list access"), ksmbd_session_rpc_method() attempts to lock sess->rpc_lock. This causes hung connections / tasks when a client attempts to open a named pipe. Using Samba's rpcclient tool: $ rpcclient //192.168.1.254 -U user%password $ rpcclient $> srvinfo <connection hung here> Kernel side: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:5021 tgid:5021 ppid:2 flags:0x00200000 Workqueue: ksmbd-io handle_ksmbd_work Call trace: __schedule from schedule+0x3c/0x58 schedule from schedule_preempt_disabled+0xc/0x10 schedule_preempt_disabled from rwsem_down_read_slowpath+0x1b0/0x1d8 rwsem_down_read_slowpath from down_read+0x28/0x30 down_read from ksmbd_session_rpc_method+0x18/0x3c ksmbd_session_rpc_method from ksmbd_rpc_open+0x34/0x68 ksmbd_rpc_open from ksmbd_session_rpc_open+0x194/0x228 ksmbd_session_rpc_open from create_smb2_pipe+0x8c/0x2c8 create_smb2_pipe from smb2_open+0x10c/0x27ac smb2_open from handle_ksmbd_work+0x238/0x3dc handle_ksmbd_work from process_scheduled_works+0x160/0x25c process_scheduled_works from worker_thread+0x16c/0x1e8 worker_thread from kthread+0xa8/0xb8 kthread from ret_from_fork+0x14/0x38 Exception stack(0x8529ffb0 to 0x8529fff8) The task deadlocks because the lock is already held: ksmbd_session_rpc_open down_write(&sess->rpc_lock) ksmbd_rpc_open ksmbd_session_rpc_method down_read(&sess->rpc_lock) <-- deadlock Adjust ksmbd_session_rpc_method() callers to take the lock when necessary.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于RPC句柄列表访问时出现递归锁定,可能导致连接挂起。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 69674b029002b1d90b655f014bdf64f404efa54d ~ 5493571f4351f74e11db9943e98a07c56467cf7e -
LinuxLinux 6.12.53 ~ 6.12.55 -

II. Public POCs for CVE-2025-40090

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-40090

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-10-30 · 20 CVEs total

CVE-2025-40096drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
CVE-2025-40105vfs: Don't leak disconnected dentries on umount
CVE-2025-40104ixgbevf: fix mailbox API compatibility by negotiating supported features
CVE-2025-40103smb: client: Fix refcount leak for cifs_sb_tlink
CVE-2025-40102KVM: arm64: Prevent access to vCPU events before init
CVE-2025-40100btrfs: do not assert we found block group item when creating free space tree
CVE-2025-40101btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST
CVE-2025-40099cifs: parse_dfs_referrals: prevent oob on malformed input
CVE-2025-40098ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()
CVE-2025-40097ALSA: hda: Fix missing pointer check in hda_component_manager_init function
CVE-2025-40086drm/xe: Don't allow evicting of BOs in same VM in array of VM binds
CVE-2025-40095usb: gadget: f_rndis: Refactor bind path to use __free()
CVE-2025-40094usb: gadget: f_acm: Refactor bind path to use __free()
CVE-2025-40093usb: gadget: f_ecm: Refactor bind path to use __free()
CVE-2025-40092usb: gadget: f_ncm: Refactor bind path to use __free()
CVE-2025-40091ixgbe: fix too early devlink_free() in ixgbe_remove()
CVE-2025-40089cxl/features: Add check for no entries in cxl_feature_info
CVE-2025-40088hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
CVE-2025-40087NFSD: Define a proc_layoutcommit for the FlexFiles layout type

IV. Related Vulnerabilities

V. Comments for CVE-2025-40090

No comments yet


Leave a comment