CVE-2025-37962

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix memory leak in parse_lease_state() The previous patch that added bounds check for create lease context introduced a memory leak. When the bounds check fails, the function returns NULL without freeing the previously allocated lease_ctx_info structure. This patch fixes the issue by adding kfree(lreq) before returning NULL in both boundary check cases.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:29

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-401
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2148d34371b06dac696c0497a98a6bf905a51650 - () https://git.kernel.org/stable/c/2148d34371b06dac696c0497a98a6bf905a51650 - Patch
References () https://git.kernel.org/stable/c/829e19ef741d9e9932abdc3bee5466195e0852cf - () https://git.kernel.org/stable/c/829e19ef741d9e9932abdc3bee5466195e0852cf - Patch
References () https://git.kernel.org/stable/c/af9e2d4732a548db8f6f5a90c2c20a789a3d7240 - () https://git.kernel.org/stable/c/af9e2d4732a548db8f6f5a90c2c20a789a3d7240 - Patch
References () https://git.kernel.org/stable/c/eb4447bcce915b43b691123118893fca4f372a8f - () https://git.kernel.org/stable/c/eb4447bcce915b43b691123118893fca4f372a8f - Patch
References () https://git.kernel.org/stable/c/facf22c1a394c1e023dab5daf9a494f722771e1c - () https://git.kernel.org/stable/c/facf22c1a394c1e023dab5daf9a494f722771e1c - Patch
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: corrección de fuga de memoria en parse_lease_state(). El parche anterior, que añadía la comprobación de los límites para el contexto de creación de arrendamiento, introducía una fuga de memoria. Cuando la comprobación de los límites falla, la función devuelve NULL sin liberar la estructura lease_ctx_info previamente asignada. Este parche corrige el problema añadiendo kfree(lreq) antes de devolver NULL en ambos casos de comprobación de los límites.
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -

20 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 16:15

Updated : 2025-12-16 20:29


NVD link : CVE-2025-37962

Mitre link : CVE-2025-37962

CVE.ORG link : CVE-2025-37962


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime