CVE-2025-37899
HIGH EXPLOITEDLinux kernel - Use After Free
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.
Exploits (3)
References (7)
Scores
CVSS v3
7.8
EPSS
0.0006
EPSS Percentile
17.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-10-09
CWE
CWE-416
Status
published
Products (6)
linux/Kernel
5.15.0 - 6.1.159linux
linux/Kernel
6.13.0 - 6.14.6linux
linux/Kernel
6.2.0 - 6.6.119linux
linux/Kernel
6.7.0 - 6.12.28linux
linux/linux_kernel
6.15 rc1 (4 CPE variants)
linux/linux_kernel
5.15 - 6.12.28
Published
May 20, 2025
Tracked Since
Feb 18, 2026