
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-38527 is a vulnerability discovered in the Linux kernel affecting the SMB client implementation. The vulnerability was disclosed on August 16, 2025, and involves a race condition in the cifs_oplock_break() function that can lead to a use-after-free condition of the cinode structure during unmounting operations (NVD).
The vulnerability stems from a race condition in the cifs_oplock_break() function where a use-after-free of the cinode structure occurs during unmounting operations. The issue manifests when umount has already released its reference to the superblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), it releases the last reference, triggering immediate cleanup of all inodes under RCU. However, cifs_oplock_break() continues to access the cinode after this point, resulting in use-after-free (NVD).
The vulnerability affects the Linux kernel's SMB client implementation and could potentially lead to system instability or crashes when unmounting SMB shares (NVD).
The vulnerability has been fixed by implementing a solution that holds an extra reference to the superblock during the entire oplock break operation. This ensures that the superblock and its inodes remain valid until the oplock break completes. The fix has been incorporated into various Linux distributions, with Debian's bookworm (security) version 6.1.147-1 and forky/sid version 6.16.3-1 containing the patch (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."