In the Linux kernel, the following vulnerability has been resolved:
ksmbd: prevent rename with empty string
Client can send empty newname string to ksmbd server. It will cause a kernel oops from d_alloc. This patch return the error when attempting to rename a file or directory with an empty new name string.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"217193494514869474105986204066974094101",
"205379839786240148483169320562793825445",
"22712881635863735348799767466283106085"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53e3e5babc0963a92d856a5ec0ce92c59f54bc12",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-47164029",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"signature_type": "Line"
},
{
"digest": {
"function_hash": "152671747496728200539185393389144216356",
"length": 443.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ee551672c8cf36108b0cfba92ec0c7c28ac3439",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-64808b72",
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_get_name"
},
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"217193494514869474105986204066974094101",
"205379839786240148483169320562793825445",
"22712881635863735348799767466283106085"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ee551672c8cf36108b0cfba92ec0c7c28ac3439",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-64bf67a0",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"signature_type": "Line"
},
{
"digest": {
"function_hash": "152671747496728200539185393389144216356",
"length": 443.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c57301e332cc413fe0a7294a90725f4e21e9549d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-99636e29",
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_get_name"
},
"signature_type": "Function"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"217193494514869474105986204066974094101",
"205379839786240148483169320562793825445",
"22712881635863735348799767466283106085"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d7f2c00acb1ef64304fd40ac507e9213ff1d9b5c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-cd3811d1",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"signature_type": "Line"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"217193494514869474105986204066974094101",
"205379839786240148483169320562793825445",
"22712881635863735348799767466283106085"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c57301e332cc413fe0a7294a90725f4e21e9549d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-ce495533",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"signature_type": "Line"
},
{
"digest": {
"function_hash": "152671747496728200539185393389144216356",
"length": 443.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53e3e5babc0963a92d856a5ec0ce92c59f54bc12",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-ecb391ec",
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_get_name"
},
"signature_type": "Function"
},
{
"digest": {
"function_hash": "152671747496728200539185393389144216356",
"length": 443.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d7f2c00acb1ef64304fd40ac507e9213ff1d9b5c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2025-37956-f3c24135",
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_get_name"
},
"signature_type": "Function"
}
]