CVE-2025-37926

Source
https://cve.org/CVERecord?id=CVE-2025-37926
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37926.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37926
Downstream
Published
2025-05-20T15:21:53.359Z
Modified
2026-05-15T11:53:59.924182655Z
Summary
ksmbd: fix use-after-free in ksmbd_session_rpc_open
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in ksmbdsessionrpc_open

A UAF issue can occur due to a race condition between ksmbdsessionrpc_open() and _sessionrpcclose(). Add rpclock to the session to protect it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37926.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
6.1.162
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.122
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.28
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37926.json"