CVE-2025-38527
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/08/2025
Last modified:
18/08/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
smb: client: fix use-after-free in cifs_oplock_break<br />
<br />
A race condition can occur in cifs_oplock_break() leading to a<br />
use-after-free of the cinode structure when unmounting:<br />
<br />
cifs_oplock_break()<br />
_cifsFileInfo_put(cfile)<br />
cifsFileInfo_put_final()<br />
cifs_sb_deactive()<br />
[last ref, start releasing sb]<br />
kill_sb()<br />
kill_anon_super()<br />
generic_shutdown_super()<br />
evict_inodes()<br />
dispose_list()<br />
evict()<br />
destroy_inode()<br />
call_rcu(&inode->i_rcu, i_callback)<br />
spin_lock(&cinode->open_file_lock) open_file_lock)
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc
- https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b
- https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995
- https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210
- https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc