In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in ksmbdfreework_struct
->interimentry of ksmbdwork could be deleted after oplock is freed. We don't need to manage it with linked list. The interim request could be immediately sent whenever a oplock break wait is needed.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21967.json"
}