Use-after-free Vulnerability in Linux Kernel's ksmbd Component
CVE-2025-21967
7.8HIGH
Summary
A use-after-free vulnerability exists in the ksmbd component of the Linux kernel, which may be exploited when an interim entry of ksmbd_work is deleted after the associated oplock is freed. This flaw can lead to potential data corruption or system instability if an attacker manages to access the freed memory before it is reallocated. System administrators are advised to apply the latest patches and updates to mitigate the risk associated with this issue.
Affected Version(s)
Linux 0626e6641f6b467447c81dd7678a69c66f7746cf
Linux 0626e6641f6b467447c81dd7678a69c66f7746cf < 62746ae3f5414244a96293e3b017be637b641280
Linux 0626e6641f6b467447c81dd7678a69c66f7746cf
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved