CVE-2025-21967

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_free_work_struct ->interim_entry of ksmbd_work could be deleted after oplock is freed. We don't need to manage it with linked list. The interim request could be immediately sent whenever a oplock break wait is needed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*

History

14 Apr 2025, 12:38

Type Values Removed Values Added
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige el problema de use-after-free en ksmbd_free_work_struct -> la entrada provisional de ksmbd_work podría eliminarse tras la liberación del bloqueo de operón. No es necesario gestionarlo con una lista enlazada. La solicitud provisional podría enviarse inmediatamente cuando se requiera una espera para la interrupción del bloqueo de operón.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/62746ae3f5414244a96293e3b017be637b641280 - () https://git.kernel.org/stable/c/62746ae3f5414244a96293e3b017be637b641280 - Patch
References () https://git.kernel.org/stable/c/bb39ed47065455604729404729d9116868638d31 - () https://git.kernel.org/stable/c/bb39ed47065455604729404729d9116868638d31 - Patch
References () https://git.kernel.org/stable/c/eb51f6f59d19b92f6fe84d3873f958495ab32f0a - () https://git.kernel.org/stable/c/eb51f6f59d19b92f6fe84d3873f958495ab32f0a - Patch
References () https://git.kernel.org/stable/c/fb776765bfc21d5e4ed03bb3d4406c2b86ff1ac3 - () https://git.kernel.org/stable/c/fb776765bfc21d5e4ed03bb3d4406c2b86ff1ac3 - Patch

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-16 14:15


NVD link : CVE-2025-21967

Mitre link : CVE-2025-21967

CVE.ORG link : CVE-2025-21967


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free