CVE-2025-71204

CWE-9117 documents7 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 97.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak in parse_durable_handle_context() When the command is a replay operation and -ENOEXEC is returned, the refcount of ksmbd_file must be released.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.6.326.6.124+3
CVEListV5linux/linux8df4bcdb0a4232192b2445256c39b787d58ef14d07df5ff4f6490a5c96715b7c562e0b2908422e04+4
Debianlinux< 6.12.73-1+1

Patches

🔴Vulnerability Details

3
OSV
CVE-2025-71204: In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak in parse_durable_handle_context() When the command i2026-02-14
GHSA
GHSA-rm73-jpvr-q26q: In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak in parse_durable_handle_context() When the command2026-02-14
CVEList
smb/server: fix refcount leak in parse_durable_handle_context()2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: smb/server: fix refcount leak in parse_durable_handle_context()2026-02-14
Debian
CVE-2025-71204: linux - In the Linux kernel, the following vulnerability has been resolved: smb/server:...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-71204 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-71204 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io