CVE-2025-37924
ksmbd: fix use-after-free in kerberos authentication
CVSS Score
9.8
EPSS Score
0.1%
EPSS Percentile
27th
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in kerberos authentication Setting sess->user = NULL was introduced to fix the dangling pointer created by ksmbd_free_user. However, it is possible another thread could be operating on the session and make use of sess->user after it has been passed to ksmbd_free_user but before sess->user is set to NULL.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 20, 2025 |
| Last Updated | Apr 2, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new critical vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Linux / Linux
0626e6641f6b467447c81dd7678a69c66f7746cf < e34a33d5d7e87399af0a138bb32f6a3e95dd83d2 0626e6641f6b467447c81dd7678a69c66f7746cf < b447463562238428503cfba1c913261047772f90 0626e6641f6b467447c81dd7678a69c66f7746cf < e18c616718018dfc440e4a2d2b94e28fe91b1861 0626e6641f6b467447c81dd7678a69c66f7746cf < 28c756738af44a404a91b77830d017bb0c525890 0626e6641f6b467447c81dd7678a69c66f7746cf < e86e9134e1d1c90a960dd57f59ce574d27b9a124
Linux / Linux
5.15
References
git.kernel.org: https://git.kernel.org/stable/c/e34a33d5d7e87399af0a138bb32f6a3e95dd83d2 git.kernel.org: https://git.kernel.org/stable/c/b447463562238428503cfba1c913261047772f90 git.kernel.org: https://git.kernel.org/stable/c/e18c616718018dfc440e4a2d2b94e28fe91b1861 git.kernel.org: https://git.kernel.org/stable/c/28c756738af44a404a91b77830d017bb0c525890 git.kernel.org: https://git.kernel.org/stable/c/e86e9134e1d1c90a960dd57f59ce574d27b9a124 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html