CVE-2025-38527

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
16/08/2025
Last modified:
07/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> smb: client: fix use-after-free in cifs_oplock_break<br /> <br /> A race condition can occur in cifs_oplock_break() leading to a<br /> use-after-free of the cinode structure when unmounting:<br /> <br /> cifs_oplock_break()<br /> _cifsFileInfo_put(cfile)<br /> cifsFileInfo_put_final()<br /> cifs_sb_deactive()<br /> [last ref, start releasing sb]<br /> kill_sb()<br /> kill_anon_super()<br /> generic_shutdown_super()<br /> evict_inodes()<br /> dispose_list()<br /> evict()<br /> destroy_inode()<br /> call_rcu(&amp;inode-&gt;i_rcu, i_callback)<br /> spin_lock(&amp;cinode-&gt;open_file_lock) open_file_lock)

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.16.72 (including) 3.17 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.171 (including) 4.10 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14.114 (including) 4.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.37 (including) 4.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.0.10 (including) 5.1 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.1.1 (including) 5.15.190 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.147 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.100 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.40 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.8 (excluding)
cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*