In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in session logoff
The sess->user object can currently be in use by another thread, for
example if another connection has sent a session setup request to
bind to the session being free'd. The handler for that connection could
be in the smb2_sess_setup function which makes use of sess->user.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-20 16:15
Updated : 2025-12-06 22:15
NVD link : CVE-2025-37899
Mitre link : CVE-2025-37899
CVE.ORG link : CVE-2025-37899
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
