CVE-2025-68263

Source
https://cve.org/CVERecord?id=CVE-2025-68263
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68263.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68263
Downstream
Related
Published
2025-12-16T14:45:05.218Z
Modified
2026-03-20T12:46:20.229572Z
Summary
ksmbd: ipc: fix use-after-free in ipc_msg_send_request
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: ipc: fix use-after-free in ipcmsgsend_request

ipcmsgsendrequest() waits for a generic netlink reply using an ipcmsgtableentry on the stack. The generic netlink handler (handlegenericevent()/handleresponse()) fills entry->response under ipcmsgtablelock, but ipcmsgsend_request() used to validate and free entry->response without holding the same lock.

Under high concurrency this allows a race where handleresponse() is copying data into entry->response while ipcmsgsendrequest() has just freed it, leading to a slab-use-after-free reported by KASAN in handlegenericevent():

BUG: KASAN: slab-use-after-free in handlegenericevent+0x3c4/0x5f0 [ksmbd] Write of size 12 at addr ffff888198ee6e20 by task pool/109349 ... Freed by task: kvfree ipcmsgsendrequest [ksmbd] ksmbdrpcopen -> ksmbdsessionrpcopen [ksmbd]

Fix by: - Taking ipcmsgtablelock in ipcmsgsendrequest() while validating entry->response, freeing it when invalid, and removing the entry from ipcmsgtable. - Returning the final entry->response pointer to the caller only after the hash entry is removed under the lock. - Returning NULL in the error path, preserving the original API semantics.

This makes all accesses to entry->response consistent with handleresponse(), which already updates and fills the response buffer under ipcmsgtablelock, and closes the race that allowed the UAF.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68263.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
de85fb58f9967ba024bb08e0041613d37b57b4d1
Fixed
708a620b471a14466f1f52c90bf3f65ebdb31460
Fixed
5ac763713a1ef8f9a8bda1dbd81f0318d67baa4e
Fixed
759c8c30cfa8706c518e56f67971b1f0932f4b9b
Fixed
8229c6ca50cea701e25a7ee25f48441b582ec5fa
Fixed
1fab1fa091f5aa97265648b53ea031deedd26235

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68263.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.62
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.12
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68263.json"