CVE-2025-68817

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*

History

26 Feb 2026, 18:43

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CWE CWE-416
References () https://git.kernel.org/stable/c/063cbbc6f595ea36ad146e1b7d2af820894beb21 - () https://git.kernel.org/stable/c/063cbbc6f595ea36ad146e1b7d2af820894beb21 - Patch
References () https://git.kernel.org/stable/c/21a3d01fc6db5129f81edb0ab7cb94fd758bcbea - () https://git.kernel.org/stable/c/21a3d01fc6db5129f81edb0ab7cb94fd758bcbea - Patch
References () https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01 - () https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01 - Patch
References () https://git.kernel.org/stable/c/b39a1833cc4a2755b02603eec3a71a85e9dff926 - () https://git.kernel.org/stable/c/b39a1833cc4a2755b02603eec3a71a85e9dff926 - Patch
References () https://git.kernel.org/stable/c/d092de8a26c952379ded8e6b0bda31d89befac1a - () https://git.kernel.org/stable/c/d092de8a26c952379ded8e6b0bda31d89befac1a - Patch
References () https://git.kernel.org/stable/c/d64977495e44855f2b28d8ce56107c963a7a50e4 - () https://git.kernel.org/stable/c/d64977495e44855f2b28d8ce56107c963a7a50e4 - Patch

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01 -

13 Jan 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-13 16:16

Updated : 2026-02-26 18:43


NVD link : CVE-2025-68817

Mitre link : CVE-2025-68817

CVE.ORG link : CVE-2025-68817


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free