Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-21947


In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix type confusion via race condition when using ipc_msg_send_request req->handle is allocated using ksmbd_acquire_id(&ipc_ida), based on ida_alloc. req->handle from ksmbd_ipc_login_request and FSCTL_PIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion between messages, resulting in access to unexpected parts of memory after an incorrect delivery. ksmbd check type of ipc response but missing add continue to check next ipc reponse.


Published

2025-04-01T16:15:25.830

Last Modified

2025-11-03T20:17:31.570

Status

Modified

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 4.7 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-362
  • Type: Secondary
    CWE-362

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 6.1.131 Yes
Operating System linux linux_kernel < 6.6.83 Yes
Operating System linux linux_kernel < 6.12.19 Yes
Operating System linux linux_kernel < 6.13.7 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes

References