First published: Thu Feb 27 2025(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable. The specific flaw exists within the implementation of session setup. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-25-100 has a CVSS rating of 9.0, indicating a critical severity level.
To fix ZDI-25-100, it is recommended to disable ksmbd on affected systems or apply the latest security patches provided by your Linux distribution.
Only installations of the Linux Kernel with ksmbd enabled are affected by ZDI-25-100.
Yes, ZDI-25-100 can be exploited remotely without requiring authentication.
ZDI-25-100 allows remote attackers to execute arbitrary code on the affected installations.