In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix type confusion via race condition when using ipcmsgsend_request
req->handle is allocated using ksmbdacquireid(&ipcida), based on idaalloc. req->handle from ksmbdipcloginrequest and FSCTLPIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion between messages, resulting in access to unexpected parts of memory after an incorrect delivery. ksmbd check type of ipc response but missing add continue to check next ipc reponse.
[
{
"id": "CVE-2025-21947-0245b126",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2ff19f0b7a30e03516e6eb73b948e27a55bc9d2",
"target": {
"file": "fs/smb/server/transport_ipc.c"
},
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"265590570144526047480250922935633479288",
"336803217966689971487616197724333744835",
"66690736908477363986724517706288000111",
"16157689520699986135328297068551931194"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-21947-40408149",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@76861630b29e51373e73e7b00ad0d467b6941162",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "handle_response"
},
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 737.0,
"function_hash": "319186477571122930049012467629177112594"
}
},
{
"id": "CVE-2025-21947-451821f4",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2ff19f0b7a30e03516e6eb73b948e27a55bc9d2",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "handle_response"
},
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 744.0,
"function_hash": "274498968430967778050257823741874592309"
}
},
{
"id": "CVE-2025-21947-48166a9e",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3cb2b2e41541fe6f9cc55ca22d4c0bd260498aea",
"target": {
"file": "fs/smb/server/transport_ipc.c"
},
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"265590570144526047480250922935633479288",
"336803217966689971487616197724333744835",
"149530705874803158269833598005089075429",
"8216941680387700092990014106014336146"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-21947-5fd4020e",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@76861630b29e51373e73e7b00ad0d467b6941162",
"target": {
"file": "fs/smb/server/transport_ipc.c"
},
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"265590570144526047480250922935633479288",
"336803217966689971487616197724333744835",
"149530705874803158269833598005089075429",
"8216941680387700092990014106014336146"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-21947-616ad822",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6321bbda4244b93802d61cfe0887883aae322f4b",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "handle_response"
},
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 737.0,
"function_hash": "319186477571122930049012467629177112594"
}
},
{
"id": "CVE-2025-21947-7bba0875",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6321bbda4244b93802d61cfe0887883aae322f4b",
"target": {
"file": "fs/smb/server/transport_ipc.c"
},
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"265590570144526047480250922935633479288",
"336803217966689971487616197724333744835",
"149530705874803158269833598005089075429",
"8216941680387700092990014106014336146"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-21947-a0bc1b4d",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3cb2b2e41541fe6f9cc55ca22d4c0bd260498aea",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "handle_response"
},
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 737.0,
"function_hash": "319186477571122930049012467629177112594"
}
},
{
"id": "CVE-2025-21947-ba5d6830",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1e8833c03a38e1d5d5df6484e3f670a2fd38fb76",
"target": {
"file": "fs/smb/server/transport_ipc.c"
},
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"265590570144526047480250922935633479288",
"336803217966689971487616197724333744835",
"66690736908477363986724517706288000111",
"16157689520699986135328297068551931194"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-21947-d0d73278",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1e8833c03a38e1d5d5df6484e3f670a2fd38fb76",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "handle_response"
},
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 744.0,
"function_hash": "274498968430967778050257823741874592309"
}
}
]