CVE-2025-37962
ksmbd: fix memory leak in parse_lease_state()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix memory leak in parse_lease_state() The previous patch that added bounds check for create lease context
introduced a memory leak. When the bounds check fails, the function
returns NULL without freeing the previously allocated lease_ctx_info
structure. This patch fixes the issue by adding kfree(lreq) before returning NULL
in both boundary check cases.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix memory leak in parse_lease_state() The previous patch that added bounds check for create lease context introduced a memory leak. When the bounds check fails, the function returns NULL without freeing the previously allocated lease_ctx_info structure. This patch fixes the issue by adding kfree(lreq) before returning NULL in both boundary check cases.
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-04-16 CVE Reserved
- 2025-05-20 CVE Published
- 2025-05-26 CVE Updated
- 2025-05-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/629dd37acc336ad778979361c351e782053ea284 | Vuln. Introduced | |
https://git.kernel.org/stable/c/60b7207893a8a06c78441934931a08fdad63f18e | Vuln. Introduced | |
https://git.kernel.org/stable/c/800c482c9ef5910f05e3a713943c67cc6c1d4939 | Vuln. Introduced | |
https://git.kernel.org/stable/c/9a1b6ea955e6c7b29939a6d98701202f9d9644ec | Vuln. Introduced | |
https://git.kernel.org/stable/c/a41cd52f00907a040ca22c73d4805bb79b0d0972 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.1.134 < 6.1.139 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.1.134 < 6.1.139" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6.87 < 6.6.91 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6.87 < 6.6.91" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.12.23 < 6.12.29 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.12.23 < 6.12.29" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.14.2 < 6.14.7 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.14.2 < 6.14.7" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 6.13.11 Search vendor "Linux" for product "Linux Kernel" and version "6.13.11" | en |
Affected
|