In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in session logoff
The sess->user object can currently be in use by another thread, for
example if another connection has sent a session setup request to
bind to the session being free'd. The handler for that connection could
be in the smb2_sess_setup function which makes use of sess->user.
Published: 2025-05-20
CVSS: 7.8
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Download Exploit for CVE-2025-37899 here:
Use Tor Browser to access .onion links.
Check our team here:
https://wednesfieldacademy.com/exploit-740-cve-2020-10148/
https://wednesfieldacademy.com/exploit-79-cve-2024-38058/
https://wednesfieldacademy.com/exploit-955-cve-2025-50071/



