Executive Summary

Informations
Name CVE-2025-21945 First vendor Publication 2025-04-01
Vendor Cve Last vendor Modification 2025-04-16

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in smb2_lock

If smb_lock->zero_len has value, ->llist of smb_lock is not delete and flock is old one. It will cause use-after-free on error handling routine.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21945

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3716

Sources (Detail)

https://git.kernel.org/stable/c/410ce35a2ed6d0e114132bba29af49b69880c8c7
https://git.kernel.org/stable/c/636e021646cf9b52ddfea7c809b018e91f2188cb
https://git.kernel.org/stable/c/84d2d1641b71dec326e8736a749b7ee76a9599fc
https://git.kernel.org/stable/c/8573571060ca466cbef2c6f03306b2cc7b883506
https://git.kernel.org/stable/c/a0609097fd10d618aed4864038393dd75131289e
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2025-06-26 02:41:11
  • Multiple Updates
2025-06-25 12:38:16
  • Multiple Updates
2025-06-24 02:45:37
  • Multiple Updates
2025-05-27 02:53:30
  • First insertion