Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-21944 |
CWE-ID | CWE-667 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU106762
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21944
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vfs_lock_file() function in fs/smb/server/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 6.1 - 6.13.6
CPE2.3https://git.kernel.org/stable/c/11e0e74e14f1832a95092f2c98ed3b99f57797ee
https://git.kernel.org/stable/c/2b70e3ac79eacbdf32571f7af48dd81cdd957ca8
https://git.kernel.org/stable/c/8994f0ce8259f812b4f4a681d8298c6ff682efaa
https://git.kernel.org/stable/c/dbcd7fdd86f77529210fe8978154a81cd479844c
https://git.kernel.org/stable/c/e26e2d2e15daf1ab33e0135caf2304a0cfa2744b
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.131
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.19
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.7
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.83
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.