CVE-2025-37776

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37776
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37776.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37776
Downstream
Published
2025-05-01T13:07:14.998Z
Modified
2025-11-28T02:34:30.429919Z
Summary
ksmbd: fix use-after-free in smb_break_all_levII_oplock()
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in smbbreakalllevIIoplock()

There is a room in smbbreakalllevIIoplock that can cause racy issues when unlocking in the middle of the loop. This patch use read lock to protect whole loop.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37776.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
296cb5457cc6f4a754c4ae29855f8a253d52bcc6
Fixed
d54ab1520d43e95f9b2e22d7a05fc9614192e5a5
Fixed
d73686367ad68534257cd88a36ca3c52cb8b81d8
Fixed
18b4fac5ef17f77fed9417d22210ceafd6525fc7

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
6.6.88
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.25
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.4