CVE-2025-71150
EUVD-2026-440423.01.2026, 15:16
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix refcount leak when invalid session is found on session lookup When a session is found but its state is not SMB2_SESSION_VALID, It indicates that no valid session was found, but it is missing to decrement the reference count acquired by the session lookup, which results in a reference count leak. This patch fixes the issue by explicitly calling ksmbd_user_session_put to release the reference to the session.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.15.176 ≤ 𝑥 < 5.16 |
| linux | linux_kernel | 6.1.121 ≤ 𝑥 < 6.1.160 |
| linux | linux_kernel | 6.6.67 ≤ 𝑥 < 6.6.120 |
| linux | linux_kernel | 6.12.6 ≤ 𝑥 < 6.12.64 |
| linux | linux_kernel | 6.13.1 ≤ 𝑥 < 6.18.3 |
| linux | linux_kernel | 6.13 |
| linux | linux_kernel | 6.13:rc3 |
| linux | linux_kernel | 6.13:rc4 |
| linux | linux_kernel | 6.13:rc5 |
| linux | linux_kernel | 6.13:rc6 |
| linux | linux_kernel | 6.13:rc7 |
| linux | linux_kernel | 6.19:rc1 |
𝑥
= Vulnerable software versions
Debian Releases
Vulnerability Media Exposure
References