In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in kerberos authentication
Setting sess->user = NULL was introduced to fix the dangling pointer
created by ksmbd_free_user. However, it is possible another thread could
be operating on the session and make use of sess->user after it has been
passed to ksmbd_free_user but before sess->user is set to NULL.
CVE ID: CVE-2025-37924
Vendor: Linux
Product: Linux
EPSS Score: 0.15% (probability of being exploited)
EPSS Percentile: 36.68% (scored less or equal to compared to others)
EPSS Date: 2025-06-18 (when was this score calculated)