Double Free Vulnerability in Linux Kernel CIFS Client
CVE-2025-21673
Summary
A vulnerability has been identified in the CIFS client of the Linux Kernel, where a double free scenario occurs due to improper management of the TCP_Server_Info::hostname during server shutdown. In the cifs_put_tcp_session() function, if the cifsd thread attempts to reconnect to multiple DFS targets, it may not realize it should exit the loop, leading to potential memory corruption. This can result in critical errors and application crashes, emphasizing the importance of applying patches and updates to maintain system security.
Affected Version(s)
Linux 7be3248f313930ff3d3436d4e9ddbe9fccc1f541 < 1ea68070338518a1d31ce71e6abfe1b30001b27a
Linux 7be3248f313930ff3d3436d4e9ddbe9fccc1f541
Linux 7be3248f313930ff3d3436d4e9ddbe9fccc1f541
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved