
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-37899 is a use-after-free vulnerability discovered in the Linux kernel's ksmbd component, which implements the SMB3 protocol for sharing files over networks. The vulnerability was officially confirmed and published on May 20, 2025. The issue specifically affects the session logoff functionality where the sess->user object can be accessed by multiple threads simultaneously during session termination (NVD, Wiz).
The vulnerability occurs in the session logoff process when one thread is processing a logoff command and frees the sess->user object. If another connection simultaneously sends a session setup request to bind to the session being freed, the handler for that connection could be in the smb2sesssetup function which makes use of sess->user, resulting in a classic use-after-free scenario. The vulnerability affects multiple Linux kernel versions up through 6.12.27, 6.14.5, and 6.15-rc4 (Cybersecurity News).
The use-after-free vulnerability can potentially lead to system instability, crashes, and memory corruption. In more severe cases, it could allow attackers to execute arbitrary code with kernel privileges (Wiz, Cybersecurity News).
Linux distributions are actively working on patches to address the vulnerability. The issue has been resolved in the Linux kernel through patches that address the use-after-free condition in the ksmbd session logoff functionality. Users are advised to apply updates as they become available (Wiz).
The vulnerability gained significant attention as it was discovered using OpenAI's o3 model, marking a watershed moment in AI-assisted vulnerability research. Security experts emphasize that while AI models like o3 aren't replacing human researchers, they are becoming powerful tools that can make security research more efficient and effective (Cybersecurity News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”