Linux Kernel Vulnerability in KSMPD Addressing Session Management Issues
CVE-2025-22040

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
16 April 2025

Summary

A vulnerability in the Linux kernel related to the ksmbd service involves a race condition occurring during session setup and deregistration. In this scenario, a session may be prematurely released from memory before it is adequately referenced in a channel list, leading to potential exploitation. A patch has been implemented to check the reference count of the session prior to its deallocation, thereby addressing the use-after-free condition and enhancing the overall security of the kernel.

Affected Version(s)

Linux 0626e6641f6b467447c81dd7678a69c66f7746cf < 596407adb9af1ee75fe7c7529607783d31b66e7f

Linux 0626e6641f6b467447c81dd7678a69c66f7746cf < 3980770cb1470054e6400fd97668665975726737

Linux 0626e6641f6b467447c81dd7678a69c66f7746cf < 9069939d762138e232a6f79e3e1462682ed6a17d

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.