Double Free Vulnerability in Linux Kernel CIFS Client
CVE-2025-21673

5.5MEDIUM

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
31 January 2025

Summary

A vulnerability has been identified in the CIFS client of the Linux Kernel, where a double free scenario occurs due to improper management of the TCP_Server_Info::hostname during server shutdown. In the cifs_put_tcp_session() function, if the cifsd thread attempts to reconnect to multiple DFS targets, it may not realize it should exit the loop, leading to potential memory corruption. This can result in critical errors and application crashes, emphasizing the importance of applying patches and updates to maintain system security.

Affected Version(s)

Linux 7be3248f313930ff3d3436d4e9ddbe9fccc1f541 < 1ea68070338518a1d31ce71e6abfe1b30001b27a

Linux 7be3248f313930ff3d3436d4e9ddbe9fccc1f541

Linux 7be3248f313930ff3d3436d4e9ddbe9fccc1f541

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.