First published: Thu Feb 27 2025(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable. The specific flaw exists within the implementation of session setup. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-25737 has a CVSS rating of 9.0, indicating critical severity.
To mitigate ZDI-CAN-25737, disable ksmbd if it's not needed or apply the latest security patches provided by your Linux distribution.
Only systems with ksmbd enabled are vulnerable to ZDI-CAN-25737.
Yes, ZDI-CAN-25737 allows remote attackers to execute arbitrary code on affected systems.
No, authentication is not required to exploit ZDI-CAN-25737.