Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21660
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Jan, 2025 | 12:18
Updated At-03 Nov, 2025 | 20:58
Rejected At-
▼CVE Numbering Authority (CNA)
ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked When `ksmbd_vfs_kern_path_locked` met an error and it is not the last entry, it will exit without restoring changed path buffer. But later this buffer may be used as the filename for creation.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/vfs.c
Default Status
unaffected
Versions
Affected
  • From d1b2d2a9c912fc7b788985fbaf944e80f4b3f2af before 13e41c58c74baa71f34c0830eaa3c29d53a6e964 (git)
  • From 6ab95e27b77730de3fa2d601db3764490c5eede2 before 65b31b9d992c0fb0685c51a0cf09993832734fc4 (git)
  • From c5a709f08d40b1a082e44ffcde1aea4d2822ddd5 before 51669f4af5f7959565b48e55691ba92fabf5c587 (git)
  • From c5a709f08d40b1a082e44ffcde1aea4d2822ddd5 before 2ac538e40278a2c0c051cca81bcaafc547d61372 (git)
  • d205cb1a13b37b2660df70a972dedc8c4ba1c2e8 (git)
  • c1e27b70e79050530c671b9dab688386c86f039a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/vfs.c
Default Status
affected
Versions
Affected
  • 6.12
Unaffected
  • From 0 before 6.12 (semver)
  • From 6.1.125 through 6.1.* (semver)
  • From 6.6.72 through 6.6.* (semver)
  • From 6.12.10 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/13e41c58c74baa71f34c0830eaa3c29d53a6e964
N/A
https://git.kernel.org/stable/c/65b31b9d992c0fb0685c51a0cf09993832734fc4
N/A
https://git.kernel.org/stable/c/51669f4af5f7959565b48e55691ba92fabf5c587
N/A
https://git.kernel.org/stable/c/2ac538e40278a2c0c051cca81bcaafc547d61372
N/A
Hyperlink: https://git.kernel.org/stable/c/13e41c58c74baa71f34c0830eaa3c29d53a6e964
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/65b31b9d992c0fb0685c51a0cf09993832734fc4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/51669f4af5f7959565b48e55691ba92fabf5c587
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2ac538e40278a2c0c051cca81bcaafc547d61372
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Details not found