CVE-2025-21967 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV5.9OSV5.5OSV4.7
EPSS
0.1%
top 79.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1
Latest updateOct 15
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in ksmbd_free_work_struct
->interim_entry of ksmbd_work could be deleted after oplock is freed.
We don't need to manage it with linked list. The interim request could be
immediately sent whenever a oplock break wait is needed.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages7 packages
▶CVEListV5linux/linux0626e6641f6b467447c81dd7678a69c66f7746cf — fb776765bfc21d5e4ed03bb3d4406c2b86ff1ac3+4