CVE-2025-37899

HIGH EXPLOITED

Linux kernel - Use After Free

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

Exploits (3)

nomisec WRITEUP 351 stars
by SeanHeelan · poc
https://github.com/SeanHeelan/o3_finds_cve-2025-37899
nomisec WRITEUP
by ccss17 · poc
https://github.com/ccss17/o3_finds_cve-2025-37899
nomisec WRITEUP
by vett3x · poc
https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

Scores

CVSS v3 7.8
EPSS 0.0006
EPSS Percentile 17.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-10-09
CWE
CWE-416
Status published
Products (6)
linux/Kernel 5.15.0 - 6.1.159linux
linux/Kernel 6.13.0 - 6.14.6linux
linux/Kernel 6.2.0 - 6.6.119linux
linux/Kernel 6.7.0 - 6.12.28linux
linux/linux_kernel 6.15 rc1 (4 CPE variants)
linux/linux_kernel 5.15 - 6.12.28
Published May 20, 2025
Tracked Since Feb 18, 2026