In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in session logoff
The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2sesssetup function which makes use of sess->user.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37899.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37899.json"
[
{
"signature_version": "v1",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02d16046cd11a5c037b28c12ffb818c56dd3ef43",
"deprecated": false,
"digest": {
"line_hashes": [
"245009311204794272961587983808261381220",
"182419502888845125998337584295431679194",
"118273448449643384061656373084521961665",
"250741765983487594053063919337115526520",
"138679403446980195430144197729644715903",
"172339352592001932069170805325594997985",
"161175489819544216422367070813627163403"
],
"threshold": 0.9
},
"id": "CVE-2025-37899-535db936",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_session_logoff"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02d16046cd11a5c037b28c12ffb818c56dd3ef43",
"deprecated": false,
"digest": {
"function_hash": "152791484000678183920390736864051416644",
"length": 1177.0
},
"id": "CVE-2025-37899-844d4ea6",
"signature_type": "Function"
}
]