vulnerability
Ubuntu: (Multiple Advisories) (CVE-2025-71153): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jan 23, 2026 | Apr 17, 2026 | Apr 20, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jan 23, 2026
Added
Apr 17, 2026
Modified
Apr 20, 2026
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix memory leak in get_file_all_info()
In get_file_all_info(), if vfs_getattr() fails, the function returns
immediately without freeing the allocated filename, leading to a memory
leak.
Fix this by freeing the filename before returning in this error case.
Solutions
ubuntu-upgrade-linux-image-6-17-0-1010-realtimeubuntu-upgrade-linux-image-6-17-0-22-genericubuntu-upgrade-linux-image-6-17-0-22-generic-64kubuntu-upgrade-linux-image-6-8-0-1037-gkeopubuntu-upgrade-linux-image-6-8-0-1050-gkeubuntu-upgrade-linux-image-6-8-0-1050-gke-64kubuntu-upgrade-linux-image-6-8-0-1051-ibmubuntu-upgrade-linux-image-6-8-0-1052-awsubuntu-upgrade-linux-image-6-8-0-1052-aws-64kubuntu-upgrade-linux-image-6-8-0-1054-gcpubuntu-upgrade-linux-image-6-8-0-1054-gcp-64kubuntu-upgrade-linux-image-6-8-0-110-genericubuntu-upgrade-linux-image-6-8-0-110-generic-64kubuntu-upgrade-linux-image-6-8-0-110-lowlatencyubuntu-upgrade-linux-image-6-8-0-110-lowlatency-64kubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-6-8ubuntu-upgrade-linux-image-aws-64kubuntu-upgrade-linux-image-aws-64k-6-8ubuntu-upgrade-linux-image-aws-64k-lts-24-04ubuntu-upgrade-linux-image-aws-lts-24-04ubuntu-upgrade-linux-image-gcp-6-8ubuntu-upgrade-linux-image-gcp-64k-6-8ubuntu-upgrade-linux-image-gcp-64k-lts-24-04ubuntu-upgrade-linux-image-gcp-lts-24-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-6-17ubuntu-upgrade-linux-image-generic-6-8ubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-6-17ubuntu-upgrade-linux-image-generic-64k-6-8ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-6-8ubuntu-upgrade-linux-image-gke-64kubuntu-upgrade-linux-image-gke-64k-6-8ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-6-8ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-6-8ubuntu-upgrade-linux-image-ibm-classicubuntu-upgrade-linux-image-ibm-lts-24-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-6-8ubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-6-8ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-realtimeubuntu-upgrade-linux-image-realtime-6-17ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-6-17ubuntu-upgrade-linux-image-virtual-6-8
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.