In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in smb2_lock
If smblock->zerolen has value, ->llist of smb_lock is not delete and flock is old one. It will cause use-after-free on error handling routine.
[
{
"id": "CVE-2025-21945-1be30f1b",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "smb2_lock",
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@636e021646cf9b52ddfea7c809b018e91f2188cb",
"digest": {
"length": 8079.0,
"function_hash": "150171461879216570882073493827254001311"
},
"signature_type": "Function"
},
{
"id": "CVE-2025-21945-41d7f0a5",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8573571060ca466cbef2c6f03306b2cc7b883506",
"digest": {
"line_hashes": [
"96191741876268530496205088161279958711",
"153990921931383456232789183118700839189",
"247855658118521615185392603106065567789",
"171769340571077801732548439527511001956",
"288493198114749018205080570470445619472",
"286381611498316459371633060515183429573",
"113927890683110337294668877982169704139",
"269998545017976823689143290045686068036",
"230300774050418953158476909421885288408",
"210543748124280484998275183906616304978"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2025-21945-47e95d74",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0609097fd10d618aed4864038393dd75131289e",
"digest": {
"line_hashes": [
"96191741876268530496205088161279958711",
"153990921931383456232789183118700839189",
"247855658118521615185392603106065567789",
"171769340571077801732548439527511001956",
"288493198114749018205080570470445619472",
"286381611498316459371633060515183429573",
"113927890683110337294668877982169704139",
"269998545017976823689143290045686068036",
"230300774050418953158476909421885288408",
"210543748124280484998275183906616304978"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2025-21945-505062b0",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@636e021646cf9b52ddfea7c809b018e91f2188cb",
"digest": {
"line_hashes": [
"96191741876268530496205088161279958711",
"153990921931383456232789183118700839189",
"247855658118521615185392603106065567789",
"171769340571077801732548439527511001956",
"288493198114749018205080570470445619472",
"286381611498316459371633060515183429573",
"113927890683110337294668877982169704139",
"269998545017976823689143290045686068036",
"230300774050418953158476909421885288408",
"210543748124280484998275183906616304978"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2025-21945-89c07677",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "smb2_lock",
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8573571060ca466cbef2c6f03306b2cc7b883506",
"digest": {
"length": 8040.0,
"function_hash": "114912590379707622607140615975344016015"
},
"signature_type": "Function"
},
{
"id": "CVE-2025-21945-d7e49b3e",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "smb2_lock",
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a0609097fd10d618aed4864038393dd75131289e",
"digest": {
"length": 8067.0,
"function_hash": "299248609935160873487969423345843332046"
},
"signature_type": "Function"
}
]