CVE-2025-38561
📋 TL;DR
A race condition vulnerability exists in the Linux kernel's ksmbd (SMB server) component where multiple concurrent session setup requests could cause improper handling of Preauth_HashValue memory. This could lead to memory corruption or crashes affecting systems running vulnerable Linux kernel versions with ksmbd enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Memory corruption leading to kernel panic, denial of service, or potential privilege escalation if combined with other vulnerabilities.
Likely Case
Denial of service through kernel crashes or system instability when handling multiple SMB session setup requests.
If Mitigated
Minimal impact with proper network segmentation and limited SMB exposure.
🎯 Exploit Status
Requires ability to send multiple concurrent SMB session setup requests with precise timing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Rebuild kernel if compiling from source. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable ksmbd module
LinuxPrevent loading of vulnerable ksmbd kernel module
echo 'blacklist ksmbd' >> /etc/modprobe.d/blacklist-ksmbd.conf
rmmod ksmbd
Restrict SMB access
LinuxLimit SMB connections using firewall rules
iptables -A INPUT -p tcp --dport 445 -j DROP
iptables -A INPUT -p tcp --dport 139 -j DROP
🧯 If You Can't Patch
- Implement network segmentation to isolate SMB servers
- Monitor for abnormal SMB session setup patterns
🔍 How to Verify
Check if Vulnerable:
Check if ksmbd module is loaded: lsmod | grep ksmbd
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version contains fix commits: uname -r and check against patched versions
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- ksmbd crash messages in dmesg
- Multiple failed SMB session attempts
Network Indicators:
- Unusual volume of SMB session setup requests
- Multiple concurrent SMB connections from single source
SIEM Query:
source="kernel" AND "ksmbd" AND ("panic" OR "crash" OR "BUG")
🔗 References
- https://git.kernel.org/stable/c/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6
- https://git.kernel.org/stable/c/6613887da1d18dd2ecfd6c6148a873c4d903ebdc
- https://git.kernel.org/stable/c/7d7c0c5304c88bcbd7a85e9bcd61d27e998ba5fc
- https://git.kernel.org/stable/c/b69fd87076daa66f3d186bd421a7b0ee0cb45829
- https://git.kernel.org/stable/c/edeecc7871e8fc0878d53ce286c75040a0e38f6c
- https://git.kernel.org/stable/c/fbf5c0845ed15122a770bca9be1d9b60b470d3aa
- https://www.zerodayinitiative.com/advisories/ZDI-25-916/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html