Home

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: client: fix memory leak in smb3_fs_context_parse_param The user calls fsconfig twice, but when the program exits, free() only frees ctx->source for the second fsconfig, not the first. Regarding fc->source, there is no code in the fs context related to its memory reclamation. To fix this memory leak, release the source memory corresponding to ctx or fc before each parsing. syzbot reported: BUG: memory leak unreferenced object 0xffff888128afa360 (size 96): backtrace (crc 79c9c7ba): kstrdup+0x3c/0x80 mm/util.c:84 smb3_fs_context_parse_param+0x229b/0x36c0 fs/smb/client/fs_context.c:1444 BUG: memory leak unreferenced object 0xffff888112c7d900 (size 96): backtrace (crc 79c9c7ba): smb3_fs_context_fullpath+0x70/0x1b0 fs/smb/client/fs_context.c:629 smb3_fs_context_parse_param+0x2266/0x36c0 fs/smb/client/fs_context.c:1438

PUBLISHED Reserved 2025-04-16 | Published 2025-12-06 | Updated 2025-12-06 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 868fc62811d3fabcf5685e14f36377a855d5412d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 48c17341577e25a22feb13d694374b61d974edbc
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 4515743cc7a42e1d67468402a6420c195532a6fa
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e8c73eb7db0a498cd4b22d2819e6ab1a6f506bd6
affected

Default status
affected

6.6.117 (semver)
unaffected

6.12.59 (semver)
unaffected

6.17.9 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/868fc62811d3fabcf5685e14f36377a855d5412d

git.kernel.org/...c/48c17341577e25a22feb13d694374b61d974edbc

git.kernel.org/...c/4515743cc7a42e1d67468402a6420c195532a6fa

git.kernel.org/...c/e8c73eb7db0a498cd4b22d2819e6ab1a6f506bd6

cve.org (CVE-2025-40268)

nvd.nist.gov (CVE-2025-40268)

Download JSON