In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix memory leak in parseleasestate()
The previous patch that added bounds check for create lease context introduced a memory leak. When the bounds check fails, the function returns NULL without freeing the previously allocated leasectxinfo structure.
This patch fixes the issue by adding kfree(lreq) before returning NULL in both boundary check cases.
[
{
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"length": 1337.0,
"function_hash": "136152449797369863851345078466146172547"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af9e2d4732a548db8f6f5a90c2c20a789a3d7240",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-37962-02df091e"
},
{
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"length": 1344.0,
"function_hash": "264188237000014613932608898274072588236"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2148d34371b06dac696c0497a98a6bf905a51650",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-37962-156be502"
},
{
"target": {
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@829e19ef741d9e9932abdc3bee5466195e0852cf",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-37962-2fbae869"
},
{
"target": {
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb4447bcce915b43b691123118893fca4f372a8f",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-37962-36223df0"
},
{
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"length": 1476.0,
"function_hash": "39641247765577777715446314690543262010"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@facf22c1a394c1e023dab5daf9a494f722771e1c",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-37962-3e7dca74"
},
{
"target": {
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2148d34371b06dac696c0497a98a6bf905a51650",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-37962-8261d83c"
},
{
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"length": 1344.0,
"function_hash": "264188237000014613932608898274072588236"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb4447bcce915b43b691123118893fca4f372a8f",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-37962-9c4e7e15"
},
{
"target": {
"function": "parse_lease_state",
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"length": 1344.0,
"function_hash": "264188237000014613932608898274072588236"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@829e19ef741d9e9932abdc3bee5466195e0852cf",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-37962-c518d9e3"
},
{
"target": {
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"297280552798311636483426580361975126302",
"29834964607141427739339918464473215146",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af9e2d4732a548db8f6f5a90c2c20a789a3d7240",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-37962-ee4b9500"
},
{
"target": {
"file": "fs/smb/server/oplock.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"178074584734993432508069977921377235853",
"210020001158152624459387897657931734037",
"291866857327806526610690588474582157388",
"154390929150227511138789737963082078046",
"201381406175084227669592754638030337374",
"261547266044451827526609310743182663637",
"216238808304272345005676008292930196637",
"29834964607141427739339918464473215146",
"77536620969330719257066019927870903088",
"199778628490901253643101932120752487496",
"121429222557650263438751250514166460292",
"314272933771905785916352230976303125461"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@facf22c1a394c1e023dab5daf9a494f722771e1c",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-37962-f1a52d0a"
}
]