We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37776

ksmbd: fix use-after-free in smb_break_all_levII_oplock()



Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb_break_all_levII_oplock() There is a room in smb_break_all_levII_oplock that can cause racy issues when unlocking in the middle of the loop. This patch use read lock to protect whole loop.

Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

0626e6641f6b467447c81dd7678a69c66f7746cf before 296cb5457cc6f4a754c4ae29855f8a253d52bcc6
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before d54ab1520d43e95f9b2e22d7a05fc9614192e5a5
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before d73686367ad68534257cd88a36ca3c52cb8b81d8
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before 18b4fac5ef17f77fed9417d22210ceafd6525fc7
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

6.6.88
unaffected

6.12.25
unaffected

6.14.4
unaffected

6.15
unaffected

References

git.kernel.org/...c/296cb5457cc6f4a754c4ae29855f8a253d52bcc6

git.kernel.org/...c/d54ab1520d43e95f9b2e22d7a05fc9614192e5a5

git.kernel.org/...c/d73686367ad68534257cd88a36ca3c52cb8b81d8

git.kernel.org/...c/18b4fac5ef17f77fed9417d22210ceafd6525fc7

cve.org (CVE-2025-37776)

nvd.nist.gov (CVE-2025-37776)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37776

Support options

Helpdesk Chat, Email, Knowledgebase