{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-37962","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.974Z","datePublished":"2025-05-20T16:01:54.612Z","dateUpdated":"2026-05-11T21:18:28.675Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:18:28.675Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix memory leak in parse_lease_state()\n\nThe previous patch that added bounds check for create lease context\nintroduced a memory leak. When the bounds check fails, the function\nreturns NULL without freeing the previously allocated lease_ctx_info\nstructure.\n\nThis patch fixes the issue by adding kfree(lreq) before returning NULL\nin both boundary check cases."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/smb/server/oplock.c"],"versions":[{"version":"629dd37acc336ad778979361c351e782053ea284","lessThan":"facf22c1a394c1e023dab5daf9a494f722771e1c","status":"affected","versionType":"git"},{"version":"60b7207893a8a06c78441934931a08fdad63f18e","lessThan":"af9e2d4732a548db8f6f5a90c2c20a789a3d7240","status":"affected","versionType":"git"},{"version":"800c482c9ef5910f05e3a713943c67cc6c1d4939","lessThan":"2148d34371b06dac696c0497a98a6bf905a51650","status":"affected","versionType":"git"},{"version":"9a1b6ea955e6c7b29939a6d98701202f9d9644ec","lessThan":"829e19ef741d9e9932abdc3bee5466195e0852cf","status":"affected","versionType":"git"},{"version":"bab703ed8472aa9d109c5f8c1863921533363dae","lessThan":"eb4447bcce915b43b691123118893fca4f372a8f","status":"affected","versionType":"git"},{"version":"a41cd52f00907a040ca22c73d4805bb79b0d0972","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/smb/server/oplock.c"],"versions":[{"version":"6.1.134","lessThan":"6.1.139","status":"affected","versionType":"semver"},{"version":"6.6.87","lessThan":"6.6.91","status":"affected","versionType":"semver"},{"version":"6.12.23","lessThan":"6.12.29","status":"affected","versionType":"semver"},{"version":"6.14.2","lessThan":"6.14.7","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.134","versionEndExcluding":"6.1.139"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.87","versionEndExcluding":"6.6.91"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.23","versionEndExcluding":"6.12.29"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.14.2","versionEndExcluding":"6.14.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/facf22c1a394c1e023dab5daf9a494f722771e1c"},{"url":"https://git.kernel.org/stable/c/af9e2d4732a548db8f6f5a90c2c20a789a3d7240"},{"url":"https://git.kernel.org/stable/c/2148d34371b06dac696c0497a98a6bf905a51650"},{"url":"https://git.kernel.org/stable/c/829e19ef741d9e9932abdc3bee5466195e0852cf"},{"url":"https://git.kernel.org/stable/c/eb4447bcce915b43b691123118893fca4f372a8f"}],"title":"ksmbd: fix memory leak in parse_lease_state()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:57:47.028Z"}}]}}