In the Linux kernel, the following vulnerability has been resolved:
ksmbd: add bounds check for create lease context
Add missing bounds check for create lease context.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a1b6ea955e6c7b29939a6d98701202f9d9644ec",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"digest": {
"function_hash": "147577463674039978592065077554480410566",
"length": 1132.0
},
"deprecated": false,
"id": "CVE-2025-22042-28eef9c7",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@60b7207893a8a06c78441934931a08fdad63f18e",
"target": {
"file": "fs/smb/server/oplock.c"
},
"digest": {
"line_hashes": [
"218243313732467707774365796571439195143",
"288816031088646090511202684418670026312",
"177444293342073940065320313975692441818",
"262993695835807637976918604328752523415",
"87396377866569425009958667384451998220",
"209916096716507152750048563785166225200"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2025-22042-3d0de1b5",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@629dd37acc336ad778979361c351e782053ea284",
"target": {
"file": "fs/smb/server/oplock.c"
},
"digest": {
"line_hashes": [
"218243313732467707774365796571439195143",
"2476936183061480043893569868403445127",
"18952814098778416677941734869529104902",
"262993695835807637976918604328752523415",
"87396377866569425009958667384451998220",
"209916096716507152750048563785166225200"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2025-22042-435224e9",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@800c482c9ef5910f05e3a713943c67cc6c1d4939",
"target": {
"file": "fs/smb/server/oplock.c"
},
"digest": {
"line_hashes": [
"218243313732467707774365796571439195143",
"288816031088646090511202684418670026312",
"177444293342073940065320313975692441818",
"262993695835807637976918604328752523415",
"87396377866569425009958667384451998220",
"209916096716507152750048563785166225200"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2025-22042-6b346d44",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bab703ed8472aa9d109c5f8c1863921533363dae",
"target": {
"file": "fs/smb/server/oplock.c"
},
"digest": {
"line_hashes": [
"218243313732467707774365796571439195143",
"288816031088646090511202684418670026312",
"177444293342073940065320313975692441818",
"262993695835807637976918604328752523415",
"87396377866569425009958667384451998220",
"209916096716507152750048563785166225200"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2025-22042-7e0c709a",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@629dd37acc336ad778979361c351e782053ea284",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"digest": {
"function_hash": "241933818565672022499791008067890061259",
"length": 1264.0
},
"deprecated": false,
"id": "CVE-2025-22042-8b2b339d",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@800c482c9ef5910f05e3a713943c67cc6c1d4939",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"digest": {
"function_hash": "203894223471667471670148176354465537370",
"length": 1125.0
},
"deprecated": false,
"id": "CVE-2025-22042-8d5620b3",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bab703ed8472aa9d109c5f8c1863921533363dae",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"digest": {
"function_hash": "147577463674039978592065077554480410566",
"length": 1132.0
},
"deprecated": false,
"id": "CVE-2025-22042-8fc3b5d1",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a41cd52f00907a040ca22c73d4805bb79b0d0972",
"target": {
"file": "fs/smb/server/oplock.c"
},
"digest": {
"line_hashes": [
"218243313732467707774365796571439195143",
"288816031088646090511202684418670026312",
"177444293342073940065320313975692441818",
"262993695835807637976918604328752523415",
"87396377866569425009958667384451998220",
"209916096716507152750048563785166225200"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2025-22042-931d5fa8",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a1b6ea955e6c7b29939a6d98701202f9d9644ec",
"target": {
"file": "fs/smb/server/oplock.c"
},
"digest": {
"line_hashes": [
"218243313732467707774365796571439195143",
"288816031088646090511202684418670026312",
"177444293342073940065320313975692441818",
"262993695835807637976918604328752523415",
"87396377866569425009958667384451998220",
"209916096716507152750048563785166225200"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2025-22042-cf8b4768",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@60b7207893a8a06c78441934931a08fdad63f18e",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"digest": {
"function_hash": "203894223471667471670148176354465537370",
"length": 1125.0
},
"deprecated": false,
"id": "CVE-2025-22042-e03fa5e3",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a41cd52f00907a040ca22c73d4805bb79b0d0972",
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"digest": {
"function_hash": "147577463674039978592065077554480410566",
"length": 1132.0
},
"deprecated": false,
"id": "CVE-2025-22042-e2b25c46",
"signature_version": "v1",
"signature_type": "Function"
}
]