First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_free_work_struct ->interim_entry of ksmbd_work could be deleted after oplock is freed. We don't need to manage it with linked list. The interim request could be immediately sent whenever a oplock break wait is needed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21967 has been rated with a severity level that indicates it presents a clear risk for use-after-free vulnerabilities in the Linux kernel.
To fix CVE-2025-21967, users should update their Linux kernel to the latest version where the vulnerability has been patched.
CVE-2025-21967 is caused by a use-after-free vulnerability in the ksmbd component of the Linux kernel, which occurs when certain memory structures are improperly managed.
CVE-2025-21967 affects several versions of the Linux kernel prior to the resolution of the vulnerability, so users should check their version against updates.
The potential impacts of CVE-2025-21967 include system crashes or arbitrary code execution due to the mishandling of memory in the Linux kernel.