In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix UAF in _closefiletableids
A use-after-free is possible if one thread destroys the file via __ksmbdclosefd while another thread holds a reference to it. The existing checks on fp->refcount are not sufficient to prevent this.
The fix takes ft->lock around the section which removes the file from the file table. This prevents two threads acquiring the same file pointer via _closefiletableids, as well as the other functions which retrieve a file from the IDR and which already use this same lock.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37952.json"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "260175773257222847811177790085746489928",
"length": 379.0
},
"target": {
"file": "fs/smb/server/vfs_cache.c",
"function": "__close_file_table_ids"
},
"id": "CVE-2025-37952-552f2921",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16727e442568a46d9cca69fe2595896de86e120d"
},
{
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"294288303377310757791548745437093119461",
"251046048233297479063260751758992324980",
"197148889405617815349985013140771980884",
"332398339607729453674680747346484241974",
"131153682936256170844378387371892085203",
"184922327260279352731784438587396024460",
"40199841766755103244352940219457614824",
"137615920886411912934134978454899790706",
"196159594728416102885240791869652015574",
"298439900293454242713580678695305121260",
"43530226857765393492570050638721101777",
"305885338936744926545531357972823652444",
"153934747458289202914992992896926311858",
"101683703806039963855299347121827494492",
"334359375455746122298337229223633944222"
]
},
"target": {
"file": "fs/smb/server/vfs_cache.c"
},
"id": "CVE-2025-37952-ddfffee0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16727e442568a46d9cca69fe2595896de86e120d"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37952.json"