Acknowledged
Created: Dec 16, 2025
Updated: Dec 18, 2025
Found In Version: 10.25.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 25
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]smb: client: fix memory leak in cifs_construct_tcon()[EOL][EOL]When having a multiuser mount with domain= specified and using[EOL]cifscreds, cifs_set_cifscreds() will end up setting @ctx->domainname,[EOL]so it needs to be freed before leaving cifs_construct_tcon().[EOL][EOL]This fixes the following memory leak reported by kmemleak:[EOL][EOL] mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...[EOL] su - testuser[EOL] cifscreds add -d ZELDA -u testuser[EOL] ...[EOL] ls /mnt/1[EOL] ...[EOL] umount /mnt[EOL] echo scan > /sys/kernel/debug/kmemleak[EOL] cat /sys/kernel/debug/kmemleak[EOL] unreferenced object 0xffff8881203c3f08 (size 8):[EOL] comm "ls", pid 5060, jiffies 4307222943[EOL] hex dump (first 8 bytes):[EOL] 5a 45 4c 44 41 00 cc cc ZELDA...[EOL] backtrace (crc d109a8cf):[EOL] __kmalloc_node_track_caller_noprof+0x572/0x710[EOL] kstrdup+0x3a/0x70[EOL] cifs_sb_tlink+0x1209/0x1770 [cifs][EOL] cifs_get_fattr+0xe1/0xf50 [cifs][EOL] cifs_get_inode_info+0xb5/0x240 [cifs][EOL] cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs][EOL] cifs_getattr+0x28e/0x450 [cifs][EOL] vfs_getattr_nosec+0x126/0x180[EOL] vfs_statx+0xf6/0x220[EOL] do_statx+0xab/0x110[EOL] __x64_sys_statx+0xd5/0x130[EOL] do_syscall_64+0xbb/0x380[EOL] entry_SYSCALL_64_after_hwframe+0x77/0x7f