In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in ksmbd_session_rpc_open
A UAF issue can occur due to a race condition between
ksmbd_session_rpc_open() and __session_rpc_close().
Add rpc_lock to the session to protect it.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 20 May 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_session_rpc_open A UAF issue can occur due to a race condition between ksmbd_session_rpc_open() and __session_rpc_close(). Add rpc_lock to the session to protect it. | |
Title | ksmbd: fix use-after-free in ksmbd_session_rpc_open | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-26T05:23:52.071Z
Reserved: 2025-04-16T04:51:23.969Z
Link: CVE-2025-37926

No data.

Status : Awaiting Analysis
Published: 2025-05-20T16:15:29.140
Modified: 2025-05-21T20:25:16.407
Link: CVE-2025-37926
