Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-37899

Description

In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in session logoffThe sess->user object can currently be in use by another thread, forexample if another connection has sent a session setup request tobind to the session being free'd. The handler for that connection couldbe in the smb2_sess_setup function which makes use of sess->user.

POC

Reference

- https://news.ycombinator.com/item?id=44081338

Github

- https://github.com/0xor0ne/awesome-list

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/GhostTroops/TOP

- https://github.com/LoboQ1ng/WeekNote

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/SalvatoreRa/ML-news-of-the-week

- https://github.com/SeanHeelan/o3_finds_cve-2025-37899

- https://github.com/TalEliyahu/AI-Security-Newsletter

- https://github.com/Yuto-Informatics/IT-News-Mai-2025

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nullaresponsio/Eternal_Pulse_Open_Source

- https://github.com/tanjiti/sec_profile

- https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

- https://github.com/voidr3aper-anon/ghost

- https://github.com/xairy/linux-kernel-exploitation