CVE-2023-54162
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix possible memory leak in smb2_lock()
argv needs to be free when setup_async_work fails or when the current process is woken up.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in ksmbd's smb2_lock() can occur when argv is not freed after setup_async_work fails or the process is woken up.
Vulnerability
Description
In the Linux kernel's ksmbd (SMB/CIFS file server), the smb a memory leak vulnerability exists in the smb2_lock() function. The issue arises because the dynamically allocated argv buffer is not freed when setup_async_work()` fails or when the current process is woken up before the work completes. This missing deallocation can lead to a gradual depletion of kernel memory over time.
Exploitation
An attacker with the ability to send crafted SMB2 lock requests to a ksmbd server can trigger this code path. No special privileges beyond network access to the SMB service are required. By repeatedly sending lock requests that cause setup_async_work() to fail or that wake the process prematurely, the attacker can cause the kernel to leak memory each time.
Impact
Repeated exploitation can exhaust system memory, potentially leading to denial of service (DoS) for the ksmbd server and other kernel services. The vulnerability does not directly allow code execution or privilege escalation, but memory exhaustion can degrade system stability and availability.
Mitigation
The fix has been applied to the Linux kernel stable tree in commits [1], [2], [3], and [4]. Users should update their kernel to a version containing the patch. No workaround is available other than applying the update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
4bfe8372ef2db6bf555ed893811d38f8a0c19d3ca9f7aeba7Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.