CVE-2025-37776

Source
https://cve.org/CVERecord?id=CVE-2025-37776
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37776.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37776
Downstream
Published
2025-05-01T13:07:14.998Z
Modified
2026-03-20T12:42:26.752775Z
Summary
ksmbd: fix use-after-free in smb_break_all_levII_oplock()
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in smbbreakalllevIIoplock()

There is a room in smbbreakalllevIIoplock that can cause racy issues when unlocking in the middle of the loop. This patch use read lock to protect whole loop.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37776.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
296cb5457cc6f4a754c4ae29855f8a253d52bcc6
Fixed
d54ab1520d43e95f9b2e22d7a05fc9614192e5a5
Fixed
d73686367ad68534257cd88a36ca3c52cb8b81d8
Fixed
18b4fac5ef17f77fed9417d22210ceafd6525fc7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37776.json"