PT-2025-22161 · Linux+4 · Linux Kernel+4

Published

2025-04-21

·

Updated

2026-03-25

·

CVE-2025-37899

CVSS v2.0

10

High

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Linux kernel versions prior to 2025
Description A use-after-free vulnerability exists in the ksmbd module of the Linux kernel’s SMB implementation, specifically within the smb2 sess setup function. This flaw occurs when handling concurrent session logoff requests, potentially allowing a remote attacker to trigger memory corruption and potentially gain kernel-level code execution. The vulnerability was discovered by a security researcher utilizing OpenAI’s o3 model, which analyzed approximately 12,000 lines of code to identify the issue. The sess->user object can be accessed by another thread while being freed, leading to the use-after-free condition.
Recommendations Update to a newer version of the Linux kernel that addresses this vulnerability. As a temporary workaround, consider disabling the ksmbd module if SMB functionality is not critical. Restrict access to the SMB service to minimize the attack surface.

Exploit

Fix

LPE

RCE

Use After Free

Weakness Enumeration

Related Identifiers

BDU:2025-06026
CVE-2025-37899
ECHO-1E9D-9C2B-8B11
USN-7649-1
USN-7649-2
USN-7650-1
USN-7665-1
USN-7665-2
USN-7721-1
USN-8059-1
USN-8059-2
USN-8059-3
USN-8059-4
USN-8059-5
USN-8059-6
USN-8059-7
USN-8059-8
USN-8059-9
USN-8125-1
USN-8126-1

Affected Products

Astra Linux
Debian
Linuxmint
Linux Kernel
Ubuntu