CVE-2025-40328

medium

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_close_cached_fid() find_or_create_cached_dir() could grab a new reference after kref_put() had seen the refcount drop to zero but before cfid_list_lock is acquired in smb2_close_cached_fid(), leading to use-after-free. Switch to kref_put_lock() so cfid_release() is called with cfid_list_lock held, closing that gap.

References

https://git.kernel.org/stable/c/cb52d9c86d70298de0ab7c7953653898cbc0efd6

https://git.kernel.org/stable/c/bdb596ceb4b7c3f28786a33840263728217fbcf5

https://git.kernel.org/stable/c/734e99623c5b65bf2c03e35978a0b980ebc3c2f8

https://git.kernel.org/stable/c/065bd62412271a2d734810dd50336cae88c54427

Details

Source: Mitre, NVD

Published: 2025-12-09

Updated: 2025-12-09

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018