CVE-2025-38527
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
smb: client: fix use-after-free in cifs_oplock_break<br />
<br />
A race condition can occur in cifs_oplock_break() leading to a<br />
use-after-free of the cinode structure when unmounting:<br />
<br />
cifs_oplock_break()<br />
_cifsFileInfo_put(cfile)<br />
cifsFileInfo_put_final()<br />
cifs_sb_deactive()<br />
[last ref, start releasing sb]<br />
kill_sb()<br />
kill_anon_super()<br />
generic_shutdown_super()<br />
evict_inodes()<br />
dispose_list()<br />
evict()<br />
destroy_inode()<br />
call_rcu(&inode->i_rcu, i_callback)<br />
spin_lock(&cinode->open_file_lock) open_file_lock)
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16.72 (including) | 3.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.171 (including) | 4.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.114 (including) | 4.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.37 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0.10 (including) | 5.1 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1.1 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.147 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.40 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.1:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.1:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc
- https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b
- https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995
- https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308
- https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210
- https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



