In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix memory leak in parseleasestate()
The previous patch that added bounds check for create lease context introduced a memory leak. When the bounds check fails, the function returns NULL without freeing the previously allocated leasectxinfo structure.
This patch fixes the issue by adding kfree(lreq) before returning NULL in both boundary check cases.
[
{
"digest": {
"function_hash": "264188237000014613932608898274072588236",
"length": 1344.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2148d34371b06dac696c0497a98a6bf905a51650",
"signature_version": "v1",
"id": "CVE-2025-37962-156be502",
"signature_type": "Function",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@829e19ef741d9e9932abdc3bee5466195e0852cf",
"signature_version": "v1",
"id": "CVE-2025-37962-2fbae869",
"signature_type": "Line",
"target": {
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb4447bcce915b43b691123118893fca4f372a8f",
"signature_version": "v1",
"id": "CVE-2025-37962-36223df0",
"signature_type": "Line",
"target": {
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"function_hash": "39641247765577777715446314690543262010",
"length": 1476.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@facf22c1a394c1e023dab5daf9a494f722771e1c",
"signature_version": "v1",
"id": "CVE-2025-37962-3e7dca74",
"signature_type": "Function",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2148d34371b06dac696c0497a98a6bf905a51650",
"signature_version": "v1",
"id": "CVE-2025-37962-8261d83c",
"signature_type": "Line",
"target": {
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"function_hash": "264188237000014613932608898274072588236",
"length": 1344.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb4447bcce915b43b691123118893fca4f372a8f",
"signature_version": "v1",
"id": "CVE-2025-37962-9c4e7e15",
"signature_type": "Function",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"function_hash": "264188237000014613932608898274072588236",
"length": 1344.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@829e19ef741d9e9932abdc3bee5466195e0852cf",
"signature_version": "v1",
"id": "CVE-2025-37962-c518d9e3",
"signature_type": "Function",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"291866857327806526610690588474582157388",
"154390929150227511138789737963082078046",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@facf22c1a394c1e023dab5daf9a494f722771e1c",
"signature_version": "v1",
"id": "CVE-2025-37962-f1a52d0a",
"signature_type": "Line",
"target": {
"file": "fs/smb/server/oplock.c"
}
}
]