CVE-2025-22040
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/04/2025
Last modified:
06/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: fix session use-after-free in multichannel connection<br />
<br />
There is a race condition between session setup and<br />
ksmbd_sessions_deregister. The session can be freed before the connection<br />
is added to channel list of session.<br />
This patch check reference count of session before freeing it.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 6.1.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.87 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3980770cb1470054e6400fd97668665975726737
- https://git.kernel.org/stable/c/596407adb9af1ee75fe7c7529607783d31b66e7f
- https://git.kernel.org/stable/c/7dfbd4c43eed91dd2548a95236908025707a8dfd
- https://git.kernel.org/stable/c/9069939d762138e232a6f79e3e1462682ed6a17d
- https://git.kernel.org/stable/c/94c281721d4ed2d972232414b91d98a6f5bdb16b
- https://git.kernel.org/stable/c/fa4cdb8cbca7d6cb6aa13e4d8d83d1103f6345db
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



