CVE-2025-38561

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 20:41

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 8.5
v2 : unknown
v3 : 4.7
References () https://git.kernel.org/stable/c/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6 - () https://git.kernel.org/stable/c/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6 - Patch
References () https://git.kernel.org/stable/c/6613887da1d18dd2ecfd6c6148a873c4d903ebdc - () https://git.kernel.org/stable/c/6613887da1d18dd2ecfd6c6148a873c4d903ebdc - Patch
References () https://git.kernel.org/stable/c/7d7c0c5304c88bcbd7a85e9bcd61d27e998ba5fc - () https://git.kernel.org/stable/c/7d7c0c5304c88bcbd7a85e9bcd61d27e998ba5fc - Patch
References () https://git.kernel.org/stable/c/b69fd87076daa66f3d186bd421a7b0ee0cb45829 - () https://git.kernel.org/stable/c/b69fd87076daa66f3d186bd421a7b0ee0cb45829 - Patch
References () https://git.kernel.org/stable/c/edeecc7871e8fc0878d53ce286c75040a0e38f6c - () https://git.kernel.org/stable/c/edeecc7871e8fc0878d53ce286c75040a0e38f6c - Patch
References () https://git.kernel.org/stable/c/fbf5c0845ed15122a770bca9be1d9b60b470d3aa - () https://git.kernel.org/stable/c/fbf5c0845ed15122a770bca9be1d9b60b470d3aa - Patch
References () https://www.zerodayinitiative.com/advisories/ZDI-25-916/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-916/ - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

17 Oct 2025, 13:15

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.5

10 Oct 2025, 16:15

Type Values Removed Values Added
References
  • () https://www.zerodayinitiative.com/advisories/ZDI-25-916/ -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: se corrige la condición de ejecución Preauh_HashValue. Si el cliente envía varias solicitudes de configuración de sesión a ksmbd, podría producirse la condición de ejecución Preauh_HashValue. No es necesario liberar sess->Preauh_HashValue durante la configuración de la sesión. Se puede liberar junto con la sesión al finalizar la conexión.

19 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 17:15

Updated : 2026-01-07 20:41


NVD link : CVE-2025-38561

Mitre link : CVE-2025-38561

CVE.ORG link : CVE-2025-38561


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')