CVE-2025-71223
📋 TL;DR
This CVE describes a reference count leak vulnerability in the Linux kernel's SMB server implementation (ksmbd). When ksmbd_vfs_getattr() fails during file operations, the system fails to properly release kernel memory references, potentially leading to resource exhaustion. This affects Linux systems running vulnerable kernel versions with ksmbd enabled.
💻 Affected Systems
- Linux kernel with ksmbd module
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker could trigger repeated failed file operations to exhaust kernel memory, causing system instability, denial of service, or potential kernel panic.
Likely Case
Local or remote attackers could cause gradual memory exhaustion leading to degraded system performance or service disruption.
If Mitigated
With proper access controls and monitoring, impact is limited to potential performance degradation rather than complete system failure.
🎯 Exploit Status
Exploitation requires ability to trigger SMB file operations that fail at the specific vulnerable code path. Likely requires authenticated access to SMB share.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits: 2456fde2b137703328f1695f60c68fe488d17e36, 39ca11ff158c98fb092176f06047628c54bcf7a1, 4665e52bde3b1f8f442895ce7d88fa62a43e48c4, f416c556997aa56ec4384c6b6efd6a0e6ac70aa7
Vendor Advisory: https://git.kernel.org/stable/c/2456fde2b137703328f1695f60c68fe488d17e36
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify ksmbd module loads correctly.
🔧 Temporary Workarounds
Disable ksmbd module
LinuxIf SMB server functionality is not required, disable the ksmbd kernel module
modprobe -r ksmbd
echo 'blacklist ksmbd' >> /etc/modprobe.d/blacklist-ksmbd.conf
Restrict SMB access
LinuxLimit SMB access to trusted networks and users only
iptables -A INPUT -p tcp --dport 445 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 445 -j DROP
🧯 If You Can't Patch
- Monitor system memory usage and kernel logs for signs of memory exhaustion
- Implement strict access controls on SMB shares to limit potential attack surface
🔍 How to Verify
Check if Vulnerable:
Check if ksmbd module is loaded: lsmod | grep ksmbd. If loaded, check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
After patching, verify kernel version includes fix commits and test SMB functionality remains operational.
📡 Detection & Monitoring
Log Indicators:
- Kernel oom-killer messages
- Memory allocation failures in dmesg
- ksmbd error logs
Network Indicators:
- Unusual SMB connection patterns
- Repeated failed file operations
SIEM Query:
source="kernel" AND ("oom" OR "out of memory") AND process="ksmbd"