CVE-2025-39692

medium

Description

In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing connections try to use smb_direct_wq as a NULL pointer.

References

https://git.kernel.org/stable/c/e41e33400516702427603f8fbbec43c91ede09c0

https://git.kernel.org/stable/c/bac7b996d42e458a94578f4227795a0d4deef6fa

https://git.kernel.org/stable/c/524e90e58a267dad11e23351d9e4b1f941490976

https://git.kernel.org/stable/c/212eb86f75b4d7b82f3d94aed95ba61103bccb93

https://git.kernel.org/stable/c/003e6a3150299f681f34cb189aa068018cef6a45

Details

Source: Mitre, NVD

Published: 2025-09-05

Updated: 2025-09-08

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018