The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-71153

CVE-2025-71153: Linux Kernel ksmbd Memory Leak Flaw

CVE-2025-71153 is a memory leak vulnerability in the Linux kernel's ksmbd component that occurs when vfs_getattr() fails. This article covers the technical details, affected versions, security impact, and mitigation.

Published: January 30, 2026

CVE-2025-71153 Overview

A memory leak vulnerability has been identified in the Linux kernel's ksmbd (in-kernel SMB server) component, specifically within the get_file_all_info() function. When the vfs_getattr() function call fails, the error handling path returns immediately without properly freeing the allocated filename buffer, resulting in a memory leak condition.

Critical Impact

This memory leak vulnerability in the ksmbd SMB server component can lead to gradual memory exhaustion on affected Linux systems, potentially causing denial of service conditions for SMB file sharing services over time.

Affected Products

  • Linux Kernel (ksmbd module)
  • Linux systems with in-kernel SMB server enabled
  • Enterprise Linux distributions using ksmbd for file sharing

Discovery Timeline

  • January 23, 2026 - CVE-2025-71153 published to NVD
  • January 26, 2026 - Last updated in NVD database

Technical Details for CVE-2025-71153

Vulnerability Analysis

The vulnerability exists in the ksmbd module's get_file_all_info() function, which is responsible for retrieving file information for SMB protocol operations. During normal operation, this function allocates memory for storing the filename. However, when the subsequent call to vfs_getattr() fails (which retrieves file attributes from the virtual file system), the function's error handling code returns immediately without freeing the previously allocated filename memory.

This improper resource management creates a classic memory leak scenario. Each time the error condition is triggered, a small amount of kernel memory becomes permanently unreclaimable until the system is rebooted. In environments with high SMB traffic or where vfs_getattr() failures occur frequently, this can lead to significant memory consumption over time.

Root Cause

The root cause is an incomplete error handling path in the get_file_all_info() function. When memory is allocated for the filename and a subsequent operation fails, the cleanup code must explicitly free all previously allocated resources before returning. In this case, the developer failed to add the necessary kfree() call for the filename buffer in the error path following the vfs_getattr() failure.

Attack Vector

The attack vector for this vulnerability is through SMB protocol interactions with the ksmbd server. An attacker with network access to an affected SMB server could potentially trigger repeated vfs_getattr() failures by:

  • Requesting information about files in unusual states
  • Exploiting race conditions during file operations
  • Targeting files on storage backends that may return errors

Each failed request would leak a small amount of kernel memory, and sustained exploitation could eventually exhaust system memory resources, leading to denial of service.

The vulnerability mechanism involves the missing cleanup in the error path of the get_file_all_info() function. When vfs_getattr() fails after the filename has been allocated, the function returns an error code without first calling kfree() on the allocated filename buffer. The fix adds proper memory deallocation before the error return. For technical implementation details, refer to the kernel security commits.

Detection Methods for CVE-2025-71153

Indicators of Compromise

  • Gradual increase in kernel memory usage on systems running ksmbd
  • Memory allocation failures or OOM (Out of Memory) conditions in kernel logs
  • Degraded SMB server performance over extended periods without restart
  • Slab memory statistics showing increasing unreclaimable memory

Detection Strategies

  • Monitor /proc/meminfo for unexplained growth in kernel memory consumption
  • Track ksmbd-related memory allocations using kernel memory debugging tools
  • Implement alerting on memory pressure indicators for systems running ksmbd
  • Review system logs for vfs_getattr() failures correlated with memory growth

Monitoring Recommendations

  • Enable kernel memory leak detection tools such as kmemleak during testing
  • Set up automated monitoring for memory consumption trends on SMB servers
  • Configure alerts for abnormal memory growth patterns in production environments
  • Periodically review /proc/slabinfo for ksmbd-related allocations

How to Mitigate CVE-2025-71153

Immediate Actions Required

  • Apply the latest kernel security patches that address CVE-2025-71153
  • Schedule system restarts for affected servers to reclaim leaked memory
  • Monitor memory usage closely on systems that cannot be immediately patched
  • Consider temporarily disabling ksmbd in favor of userspace Samba if patching is delayed

Patch Information

The Linux kernel maintainers have released patches to fix this memory leak. The fix ensures that the allocated filename is properly freed before returning in the vfs_getattr() error case. Multiple kernel versions have been patched as documented in the kernel stable git commits:

  • Commit 0c56693b06a6
  • Commit 5012b4c81223
  • Commit 676907004256
  • Commit d026f47db686

Administrators should update to a kernel version containing these fixes as soon as possible.

Workarounds

  • Implement scheduled restarts of affected systems to periodically reclaim leaked memory
  • Use userspace Samba implementation instead of ksmbd until patches are applied
  • Limit network access to ksmbd services to reduce potential attack surface
  • Monitor and set memory limits to prevent complete system exhaustion
bash
# Configuration example
# Check if ksmbd module is loaded
lsmod | grep ksmbd

# Monitor kernel memory usage
watch -n 60 'cat /proc/meminfo | grep -E "MemFree|Slab|SReclaimable|SUnreclaim"'

# If using ksmbd, consider switching to userspace samba temporarily
# Stop ksmbd service and start smbd instead
systemctl stop ksmbd
systemctl start smbd

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Security Commit Update

  • Kernel Security Commit Update

  • Kernel Security Commit Update

  • Kernel Security Commit Update
  • Related CVEs
  • CVE-2026-23457: Linux Kernel Integer Truncation Vulnerability

  • CVE-2026-23442: Linux Kernel IPv6 SRv6 Null Pointer Flaw

  • CVE-2026-23431: Linux Kernel Memory Leak Vulnerability

  • CVE-2026-31391: Linux Kernel Atmel SHA204A OOM Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English