SB2025072713 - Use-after-free in Linux kernel smb server
Published: July 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-38437)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb20_oplock_break_ack() and smb21_lease_break_ack() functions in fs/smb/server/smb2pdu.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/50f930db22365738d9387c974416f38a06e8057e
- https://git.kernel.org/stable/c/8106adc21a2270c16abf69cd74ccd7c79c6e7acd
- https://git.kernel.org/stable/c/815f1161d6dbc4c54ccf94b7d3fdeab34b4d7477
- https://git.kernel.org/stable/c/97c355989928a5f60b228ef5266c1be67a46cdf9
- https://git.kernel.org/stable/c/e38ec88a2b42c494601b1213816d75f0b54d9bf0