CVE-2025-21947

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21947
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21947.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21947
Downstream
Published
2025-04-01T15:41:09.457Z
Modified
2025-11-28T02:35:15.863718Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ksmbd: fix type confusion via race condition when using ipc_msg_send_request
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix type confusion via race condition when using ipcmsgsend_request

req->handle is allocated using ksmbdacquireid(&ipcida), based on idaalloc. req->handle from ksmbdipcloginrequest and FSCTLPIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion between messages, resulting in access to unexpected parts of memory after an incorrect delivery. ksmbd check type of ipc response but missing add continue to check next ipc reponse.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21947.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
6321bbda4244b93802d61cfe0887883aae322f4b
Fixed
76861630b29e51373e73e7b00ad0d467b6941162
Fixed
3cb2b2e41541fe6f9cc55ca22d4c0bd260498aea
Fixed
1e8833c03a38e1d5d5df6484e3f670a2fd38fb76
Fixed
e2ff19f0b7a30e03516e6eb73b948e27a55bc9d2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
6.1.131
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.83
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.19
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.7