In the Linux kernel, the following vulnerability has been resolved:
smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()
We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()!
Otherwise already existing connections try to use smb_direct_wq as
a NULL pointer.
smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()
We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()!
Otherwise already existing connections try to use smb_direct_wq as
a NULL pointer.
Metrics
Affected Vendors & Products
References
History
Fri, 05 Sep 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing connections try to use smb_direct_wq as a NULL pointer. | |
Title | smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-09-05T17:20:58.349Z
Reserved: 2025-04-16T07:20:57.114Z
Link: CVE-2025-39692

No data.

Status : Received
Published: 2025-09-05T18:15:45.980
Modified: 2025-09-05T18:15:45.980
Link: CVE-2025-39692

No data.

No data.