Home

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix oops due to uninitialised variable Fix smb3_init_transform_rq() to initialise buffer to NULL before calling netfs_alloc_folioq_buffer() as netfs assumes it can append to the buffer it is given. Setting it to NULL means it should start a fresh buffer, but the value is currently undefined.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-05 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

a2906d3316fc19bf0ade84618bb73eab604c447e (git) before 4931fe2dbe1cc0e7d350a4b51b0b330e43971d98
affected

a2906d3316fc19bf0ade84618bb73eab604c447e (git) before 6adaa9fae36f848afa7278945d725e197e33c496
affected

a2906d3316fc19bf0ade84618bb73eab604c447e (git) before 453a6d2a68e54a483d67233c6e1e24c4095ee4be
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.12.44 (semver)
unaffected

6.16.4 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/4931fe2dbe1cc0e7d350a4b51b0b330e43971d98

git.kernel.org/...c/6adaa9fae36f848afa7278945d725e197e33c496

git.kernel.org/...c/453a6d2a68e54a483d67233c6e1e24c4095ee4be

cve.org (CVE-2025-38737)

nvd.nist.gov (CVE-2025-38737)

Download JSON