SB2025040295 - Double free in Linux kernel smb server
Published: April 2, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Double free (CVE-ID: CVE-2025-21955)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the handle_ksmbd_work() and queue_ksmbd_work() functions in fs/smb/server/server.c, within the __smb2_oplock_break_noti(), smb2_oplock_break_noti(), __smb2_lease_break_noti() and smb2_lease_break_noti() functions in fs/smb/server/oplock.c, within the ksmbd_conn_init_server_callbacks() function in fs/smb/server/connection.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/09aeab68033161cb54f194da93e51a11aee6144b
- https://git.kernel.org/stable/c/3aa660c059240e0c795217182cf7df32909dd917
- https://git.kernel.org/stable/c/a4261bbc33fbf99b99c80aa3a2c5097611802980
- https://git.kernel.org/stable/c/f17d1c63a76b0fe8e9c78023a86507a3a6d62cfa
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.8