Critical severity9.8NVD Advisory· Published May 20, 2025· Updated Apr 2, 2026
CVE-2025-37924
CVE-2025-37924
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in kerberos authentication
Setting sess->user = NULL was introduced to fix the dangling pointer created by ksmbd_free_user. However, it is possible another thread could be operating on the session and make use of sess->user after it has been passed to ksmbd_free_user but before sess->user is set to NULL.
Affected products
6- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=5.15,<6.1.138
- cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
Patches
5e34a33d5d7e8b44746356223e18c6167180128c756738af4e86e9134e1d1Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
1- lists.debian.org/debian-lts-announce/2025/08/msg00010.htmlnvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.