In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix r_count dec/increment mismatch
r_count is only increased when there is an oplock break wait,
so r_count inc/decrement are not paired. This can cause r_count
to become negative, which can lead to a problem where the ksmbd
thread does not terminate.
References
Configurations
Configuration 1 (hide)
|
History
14 Nov 2025, 16:46
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/20378cf48359f39dee0ef9b61470ebe77bd49c0d - Patch | |
| References | () https://git.kernel.org/stable/c/457db486203c90e10c3efc87fd45cc7000b1cd36 - Patch | |
| References | () https://git.kernel.org/stable/c/4790bcb269e5d6d88200a67c54ae6d627332a3be - Patch | |
| References | () https://git.kernel.org/stable/c/c2ec33d46b4d1c8085dab5d02e00b21f4f0fb8a9 - Patch | |
| References | () https://git.kernel.org/stable/c/ddb7ea36ba7129c2ed107e2186591128618864e1 - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-Other | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.14:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
16 Apr 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-16 15:16
Updated : 2025-11-14 16:46
NVD link : CVE-2025-22074
Mitre link : CVE-2025-22074
CVE.ORG link : CVE-2025-22074
JSON object : View
Products Affected
linux
- linux_kernel
CWE
