Use-After-Free Vulnerability in Linux Kernel Affecting SMB2 Lock Functionality
CVE-2025-21945
Summary
A use-after-free vulnerability exists within the Linux kernel's SMB2 lock handling that can lead to potential system instability. When the 'zero_len' attribute of an smb_lock structure is set, the associated 'llist' is not properly deleted, leaving a situation where a previously allocated memory block can be referenced after being freed. This issue may arise during error handling routines, allowing for unintended behaviors that could be exploited by malicious actors to execute arbitrary code or crash systems.
Affected Version(s)
Linux 0626e6641f6b467447c81dd7678a69c66f7746cf < 410ce35a2ed6d0e114132bba29af49b69880c8c7
Linux 0626e6641f6b467447c81dd7678a69c66f7746cf < 8573571060ca466cbef2c6f03306b2cc7b883506
Linux 0626e6641f6b467447c81dd7678a69c66f7746cf
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved