CVE-2025-37926
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
20/05/2025
Last modified:
17/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: fix use-after-free in ksmbd_session_rpc_open<br />
<br />
A UAF issue can occur due to a race condition between<br />
ksmbd_session_rpc_open() and __session_rpc_close().<br />
Add rpc_lock to the session to protect it.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 6.12.28 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1067361a1cc6ad9cdf7acfc47f90012b72ad1502
- https://git.kernel.org/stable/c/6323fec65fe54b365961fed260dd579191e46121
- https://git.kernel.org/stable/c/8fb3b6c85b7e3127161623586b62abcc366caa20
- https://git.kernel.org/stable/c/a1f46c99d9ea411f9bf30025b912d881d36fc709
- https://git.kernel.org/stable/c/a4348710a7267705b75692dc1a000920481d1d92



