In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read in smb2_sess_setup ksmbd does not consider the case of that smb2 session setup is in compound request. If this is the second payload of the compound, OOB read issue occurs while processing the first payload in the smb2_sess_setup().
https://git.kernel.org/stable/c/ef572ffa8eb44111eed2925fbb2adca78bdcbf61
https://git.kernel.org/stable/c/98422bdd4cb3ca4d08844046f6507d7ec2c2b8d8
https://git.kernel.org/stable/c/676392184785ace61e939831e7ca44a03d438c3b
https://git.kernel.org/stable/c/2ba03cecb12ac7ac9e0170e251543c56832d9959