{"id":"CVE-2025-68295","summary":"smb: client: fix memory leak in cifs_construct_tcon()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix memory leak in cifs_construct_tcon()\n\nWhen having a multiuser mount with domain= specified and using\ncifscreds, cifs_set_cifscreds() will end up setting @ctx-\u003edomainname,\nso it needs to be freed before leaving cifs_construct_tcon().\n\nThis fixes the following memory leak reported by kmemleak:\n\n  mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...\n  su - testuser\n  cifscreds add -d ZELDA -u testuser\n  ...\n  ls /mnt/1\n  ...\n  umount /mnt\n  echo scan \u003e /sys/kernel/debug/kmemleak\n  cat /sys/kernel/debug/kmemleak\n  unreferenced object 0xffff8881203c3f08 (size 8):\n    comm \"ls\", pid 5060, jiffies 4307222943\n    hex dump (first 8 bytes):\n      5a 45 4c 44 41 00 cc cc                          ZELDA...\n    backtrace (crc d109a8cf):\n      __kmalloc_node_track_caller_noprof+0x572/0x710\n      kstrdup+0x3a/0x70\n      cifs_sb_tlink+0x1209/0x1770 [cifs]\n      cifs_get_fattr+0xe1/0xf50 [cifs]\n      cifs_get_inode_info+0xb5/0x240 [cifs]\n      cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]\n      cifs_getattr+0x28e/0x450 [cifs]\n      vfs_getattr_nosec+0x126/0x180\n      vfs_statx+0xf6/0x220\n      do_statx+0xab/0x110\n      __x64_sys_statx+0xd5/0x130\n      do_syscall_64+0xbb/0x380\n      entry_SYSCALL_64_after_hwframe+0x77/0x7f","modified":"2026-04-28T18:29:28.922116263Z","published":"2025-12-16T15:06:14.977Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1078-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68295.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3184b6a5a24ec9ee74087b2a550476f386df7dc2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3dd546e867e94c2f954bca45a961b6104ba708b6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a67e91d5f446e455dd9201cdd6e865f7078d251d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d146e96fef876492979658dce644305de35878d4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f15288c137d960836277d0e3ecc62de68e52f00f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f62ffdfb431bdfa4b6d24233b7fd830eca0b801e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ff8f9bd1c46ee02d5558293915d42e82646d5ee9"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68295.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68295"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f2aee329a68f5a907bcff11a109dfe17c0b41aeb"},{"fixed":"ff8f9bd1c46ee02d5558293915d42e82646d5ee9"},{"fixed":"d146e96fef876492979658dce644305de35878d4"},{"fixed":"3dd546e867e94c2f954bca45a961b6104ba708b6"},{"fixed":"f62ffdfb431bdfa4b6d24233b7fd830eca0b801e"},{"fixed":"f15288c137d960836277d0e3ecc62de68e52f00f"},{"fixed":"a67e91d5f446e455dd9201cdd6e865f7078d251d"},{"fixed":"3184b6a5a24ec9ee74087b2a550476f386df7dc2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"1456d3cea31114137fabf1110d20a2e2c6d6060f"},{"last_affected":"16764d7486d02b1699ae16e91d7a577602398b17"},{"last_affected":"904847402bd74a28164bd4d8da082d1eace7c190"},{"last_affected":"325fa2a6729b74b2806b31725940cb54658515e5"},{"last_affected":"8db988a982908b7bff76e095000adabf9c29698b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68295.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.3.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.119"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68295.json"}}],"schema_version":"1.7.5"}