CVE-2025-39932
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the smb client where the function smbd_destroy() did not properly wait for the post_send_credits_work to finish before destroying memory. This could lead to post_send_credits_work being executed after the memory it relies on has been freed, causing potential use-after-free issues or crashes. The problem was observed in the rxe driver where rxe_post_recv was called after rdma_destroy_qp(), due to queued work being processed after the associated resources were destroyed.
How can this vulnerability impact me? :
This vulnerability can lead to system instability or crashes due to use-after-free conditions when the kernel processes certain SMB client operations. It may cause unexpected behavior or denial of service in systems using the affected Linux kernel SMB client code, especially in environments using the rxe driver for RDMA over Converged Ethernet.