HomeDefault status
unaffected
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before bfe8372ef2dbdce97f13b21d76e2080ddeef5a79
affected
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 6bf555ed8938444466c3d7f3252eb874a518f293
affected
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 11d38f8a0c19763e34d2093b5ecb640e012cb2d2
affected
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before d3ca9f7aeba793d74361d88a8800b2f205c9236b
affected
Default status
affected
5.15
affected
Any version before 5.15
unaffected
5.15.145 (semver)
unaffected
6.1.16 (semver)
unaffected
6.2.3 (semver)
unaffected
6.3 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_async_work fails or when the current process is woken up.
Product status
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before bfe8372ef2dbdce97f13b21d76e2080ddeef5a79
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 6bf555ed8938444466c3d7f3252eb874a518f293
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 11d38f8a0c19763e34d2093b5ecb640e012cb2d2
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before d3ca9f7aeba793d74361d88a8800b2f205c9236b
5.15
Any version before 5.15
5.15.145 (semver)
6.1.16 (semver)
6.2.3 (semver)
6.3 (original_commit_for_fix)
References
git.kernel.org/...c/bfe8372ef2dbdce97f13b21d76e2080ddeef5a79
git.kernel.org/...c/6bf555ed8938444466c3d7f3252eb874a518f293
git.kernel.org/...c/11d38f8a0c19763e34d2093b5ecb640e012cb2d2
git.kernel.org/...c/d3ca9f7aeba793d74361d88a8800b2f205c9236b
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.