CVE-2025-71220

CWE-7727 documents7 sources
Severity
7.8HIGH
EPSS
0.0%
top 96.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() When ksmbd_iov_pin_rsp() fails, we should call ksmbd_session_rpc_close().

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.15.1455.15.200+5
CVEListV5linux/linuxf2283680a80571ca82d710bc6ecd8f8beac67d63a2c68e256fb7a4ac34154c6e865a1389acca839f+6
Debianlinux< 6.1.164-1+2
Debianlinux-6.1< 6.1.164-1~deb11u1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6hxq-g3f7-5m89: In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() W2026-02-14
OSV
CVE-2025-71220: In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() Whe2026-02-14
CVEList
smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()2026-02-14
Debian
CVE-2025-71220: linux - In the Linux kernel, the following vulnerability has been resolved: smb/server:...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-71220 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-71220 (HIGH CVSS 7.8) | In the Linux kernel | cvebase.io