Executive Summary

Informations
Name CVE-2025-37899 First vendor Publication 2025-05-20
Vendor Cve Last vendor Modification 2025-05-24

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in session logoff

The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37899

Sources (Detail)

https://git.kernel.org/stable/c/02d16046cd11a5c037b28c12ffb818c56dd3ef43
https://git.kernel.org/stable/c/2fc9feff45d92a92cd5f96487655d5be23fb7e2b
https://git.kernel.org/stable/c/d5ec1d79509b3ee01de02c236f096bc050221b7f
https://news.ycombinator.com/item?id=44081338
https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remo...
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-26 21:20:41
  • First insertion