In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix session use-after-free in multichannel connection
There is a race condition between session setup and
ksmbd_sessions_deregister. The session can be freed before the connection
is added to channel list of session.
This patch check reference count of session before freeing it.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
06 Apr 2026, 14:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory | |
| First Time |
Debian debian Linux
Debian |
|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
02 Apr 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Apr 2025, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/3980770cb1470054e6400fd97668665975726737 - Patch | |
| References | () https://git.kernel.org/stable/c/596407adb9af1ee75fe7c7529607783d31b66e7f - Patch | |
| References | () https://git.kernel.org/stable/c/7dfbd4c43eed91dd2548a95236908025707a8dfd - Patch | |
| References | () https://git.kernel.org/stable/c/9069939d762138e232a6f79e3e1462682ed6a17d - Patch | |
| References | () https://git.kernel.org/stable/c/94c281721d4ed2d972232414b91d98a6f5bdb16b - Patch | |
| References | () https://git.kernel.org/stable/c/fa4cdb8cbca7d6cb6aa13e4d8d83d1103f6345db - Patch |
21 Apr 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 |
16 Apr 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-16 15:15
Updated : 2026-04-06 14:29
NVD link : CVE-2025-22040
Mitre link : CVE-2025-22040
CVE.ORG link : CVE-2025-22040
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free
