In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in destroy_previous_session If client set ->PreviousSessionId on kerberos session setup stage, NULL pointer dereference error will happen. Since sess->user is not set yet, It can pass the user argument as NULL to destroy_previous_session. sess->user will be set in ksmbd_krb5_authenticate(). So this patch move calling destroy_previous_session() after ksmbd_krb5_authenticate().
https://git.kernel.org/stable/c/7ac5b66acafcc9292fb935d7e03790f2b8b2dc0e
https://git.kernel.org/stable/c/281afc52e2961cd5dd8326ebc9c5bc40904c0468
https://git.kernel.org/stable/c/1193486dffb7432a09f57f5d09049b4d4123538b
https://git.kernel.org/stable/c/0902625a24eea7fdc187faa5d97df244d159dd6e
https://git.kernel.org/stable/c/076f1adefb9837977af7ed233883842ddc446644