CVE-2025-22040

Source
https://cve.org/CVERecord?id=CVE-2025-22040
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22040.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22040
Downstream
Related
Published
2025-04-16T14:11:57.601Z
Modified
2026-03-09T23:55:28.951044Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ksmbd: fix session use-after-free in multichannel connection
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix session use-after-free in multichannel connection

There is a race condition between session setup and ksmbdsessionsderegister. The session can be freed before the connection is added to channel list of session. This patch check reference count of session before freeing it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22040.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
596407adb9af1ee75fe7c7529607783d31b66e7f
Fixed
3980770cb1470054e6400fd97668665975726737
Fixed
9069939d762138e232a6f79e3e1462682ed6a17d
Fixed
94c281721d4ed2d972232414b91d98a6f5bdb16b
Fixed
7dfbd4c43eed91dd2548a95236908025707a8dfd
Fixed
fa4cdb8cbca7d6cb6aa13e4d8d83d1103f6345db

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22040.json"