In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix UAF in __close_file_table_ids
A use-after-free is possible if one thread destroys the file
via __ksmbd_close_fd while another thread holds a reference to
it. The existing checks on fp->refcount are not sufficient to
prevent this.
The fix takes ft->lock around the section which removes the
file from the file table. This prevents two threads acquiring the
same file pointer via __close_file_table_ids, as well as the other
functions which retrieve a file from the IDR and which already use
this same lock.
References
Configurations
Configuration 1 (hide)
|
History
17 Nov 2025, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 | |
| References | () https://git.kernel.org/stable/c/16727e442568a46d9cca69fe2595896de86e120d - Patch | |
| References | () https://git.kernel.org/stable/c/36991c1ccde2d5a521577c448ffe07fcccfe104d - Patch | |
| References | () https://git.kernel.org/stable/c/9e9841e232b51171ddf3bc4ee517d5d28dc8cad6 - Patch | |
| References | () https://git.kernel.org/stable/c/fec1f9e9a650e8e7011330a085c77e7bf2a08ea9 - Patch | |
| Summary |
|
20 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-20 16:15
Updated : 2025-11-17 12:57
NVD link : CVE-2025-37952
Mitre link : CVE-2025-37952
CVE.ORG link : CVE-2025-37952
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
