CVE-2025-22040Use After Free in Linux

CWE-416Use After Free39 documents7 sources
Severity
8.8HIGHNVD
OSV7.1OSV5.9
EPSS
0.1%
top 65.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16
Latest updateJan 9

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix session use-after-free in multichannel connection There is a race condition between session setup and ksmbd_sessions_deregister. The session can be freed before the connection is added to channel list of session. This patch check reference count of session before freeing it.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages8 packages

NVDlinux/linux_kernel5.156.1.134+4
Debianlinux/linux_kernel< 6.1.135-1+2
Ubuntulinux/linux_kernel< 6.8.0-86.87+1
CVEListV5linux/linux0626e6641f6b467447c81dd7678a69c66f7746cf596407adb9af1ee75fe7c7529607783d31b66e7f+6

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

19
OSV
linux-azure-nvidia vulnerabilities2026-01-09
OSV
linux-azure-fips vulnerabilities2025-12-17
OSV
linux-raspi vulnerabilities2025-11-25
OSV
linux-raspi-realtime vulnerabilities2025-11-24
OSV
linux-aws-6.8 vulnerabilities2025-11-12

📋Vendor Advisories

19
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2026-01-09
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-12-17
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-11-25
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-11-24
Ubuntu
Linux kernel (AWS) vulnerabilities2025-11-12
CVE-2025-22040 — Use After Free in Linux | cvebase