<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3olinuxlinux_kernel6.15rc1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 07:50:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3olinuxlinux_kernel6.15rc1/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2025-37750 SMB Client Use-After-Free Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-smb-uaf/</link><pubDate>Mon, 11 May 2026 07:50:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-smb-uaf/</guid><description>CVE-2025-37750 is a use-after-free vulnerability in the SMB client related to decryption with multichannel that could lead to code execution.</description><content:encoded><![CDATA[<p>CVE-2025-37750 is a use-after-free vulnerability affecting the SMB client, specifically during decryption with multichannel. While specific details are scarce, the nature of a use-after-free vulnerability in a network protocol client suggests a potential for remote code execution if an attacker can control the SMB server response. Microsoft has released a security update to address this vulnerability. This vulnerability poses a significant risk to systems acting as SMB clients, as a compromised SMB server or a man-in-the-middle attacker could potentially exploit this flaw.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, the following attack chain is inferred based on the nature of the vulnerability and typical SMB client interactions:</p>
<ol>
<li>An attacker compromises or controls an SMB server.</li>
<li>A client initiates an SMB connection to the malicious server.</li>
<li>The server sends a response requiring multichannel negotiation.</li>
<li>The client attempts to negotiate multichannel and starts decryption.</li>
<li>The server sends a specially crafted response during decryption, triggering the use-after-free condition within the SMB client.</li>
<li>The vulnerability is triggered and allows the attacker to corrupt memory.</li>
<li>The attacker leverages the memory corruption to achieve code execution on the client machine.</li>
<li>The attacker gains control of the client system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-37750 allows a malicious SMB server or man-in-the-middle attacker to execute arbitrary code on the client machine. This could lead to complete system compromise, including data theft, malware installation, and lateral movement within the network. The lack of specific details makes quantifying the exact impact difficult, but the potential for remote code execution warrants immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2025-37750.</li>
<li>Monitor SMB client connections for unusual patterns or connections to untrusted servers using network connection logs (product: windows, category: network_connection).</li>
<li>Deploy the provided Sigma rule to detect suspicious processes spawned after SMB client activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>smb</category><category>use-after-free</category><category>rce</category></item><item><title>CVE-2025-37877 iommu: Clear iommu-dma ops on cleanup</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2025-37877-iommu/</link><pubDate>Mon, 11 May 2026 07:50:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2025-37877-iommu/</guid><description>CVE-2025-37877 is a vulnerability in the iommu component requiring proper cleanup, affecting Microsoft products.</description><content:encoded><![CDATA[<p>CVE-2025-37877 is a vulnerability related to the Input/Output Memory Management Unit (IOMMU) within Microsoft products. The vulnerability stems from a failure to properly clear iommu-dma operations during cleanup, potentially leading to resource management issues or unexpected behavior. This could be exploited to cause a denial-of-service or potentially gain unauthorized access, depending on the specific implementation and affected components. The vulnerability requires a specifically crafted input or condition to trigger the improper cleanup sequence. Successful exploitation could destabilize the system or expose sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (details unspecified in source).</li>
<li>The attacker triggers a specific operation that utilizes the IOMMU.</li>
<li>The IOMMU processes the request, allocating resources for DMA operations.</li>
<li>The initial operation completes or is terminated abnormally.</li>
<li>The cleanup routine for the IOMMU fails to properly clear the iommu-dma operations.</li>
<li>Subsequent IOMMU operations may be affected by the uncleared state.</li>
<li>An attacker exploits the lingering state to cause a denial-of-service by exhausting resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-37877 can lead to denial-of-service conditions due to resource exhaustion or system instability. The number of potential victims is broad, affecting systems that utilize the vulnerable IOMMU implementation. The primary impact involves the interruption of services and potential data loss or corruption, depending on the specific context of the exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2025-37877 as soon as possible, as referenced in the advisory.</li>
<li>Monitor systems for unexpected IOMMU-related errors or resource exhaustion, which could indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>iommu</category><category>cleanup</category></item></channel></rss>