CVE-2025-38191

medium

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in destroy_previous_session If client set ->PreviousSessionId on kerberos session setup stage, NULL pointer dereference error will happen. Since sess->user is not set yet, It can pass the user argument as NULL to destroy_previous_session. sess->user will be set in ksmbd_krb5_authenticate(). So this patch move calling destroy_previous_session() after ksmbd_krb5_authenticate().

References

https://git.kernel.org/stable/c/7ac5b66acafcc9292fb935d7e03790f2b8b2dc0e

https://git.kernel.org/stable/c/281afc52e2961cd5dd8326ebc9c5bc40904c0468

https://git.kernel.org/stable/c/1193486dffb7432a09f57f5d09049b4d4123538b

https://git.kernel.org/stable/c/0902625a24eea7fdc187faa5d97df244d159dd6e

https://git.kernel.org/stable/c/076f1adefb9837977af7ed233883842ddc446644

Details

Source: Mitre, NVD

Published: 2025-07-04

Updated: 2025-07-08

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018