In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in session logoffThe sess->user object can currently be in use by another thread, forexample if another connection has sent a session setup request tobind to the session being free'd. The handler for that connection couldbe in the smb2_sess_setup function which makes use of sess->user.
- https://news.ycombinator.com/item?id=44081338
- https://github.com/0xor0ne/awesome-list
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/GhostTroops/TOP
- https://github.com/LoboQ1ng/WeekNote
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/SalvatoreRa/ML-news-of-the-week
- https://github.com/SeanHeelan/o3_finds_cve-2025-37899
- https://github.com/TalEliyahu/AI-Security-Newsletter
- https://github.com/Yuto-Informatics/IT-News-Mai-2025
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nullaresponsio/Eternal_Pulse_Open_Source
- https://github.com/tanjiti/sec_profile
- https://github.com/vett3x/SMB-LINUX-CVE-2025-37899
- https://github.com/voidr3aper-anon/ghost
- https://github.com/xairy/linux-kernel-exploitation