CVE-2025-38191
ksmbd: fix null pointer dereference in destroy_previous_session
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in destroy_previous_session If client set ->PreviousSessionId on kerberos session setup stage, NULL pointer dereference error will happen. Since sess->user is not set yet, It can pass the user argument as NULL to destroy_previous_session. sess->user will be set in ksmbd_krb5_authenticate(). So this patch move calling destroy_previous_session() after ksmbd_krb5_authenticate().
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 4, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
0626e6641f6b467447c81dd7678a69c66f7746cf < 281afc52e2961cd5dd8326ebc9c5bc40904c0468 0626e6641f6b467447c81dd7678a69c66f7746cf < 0902625a24eea7fdc187faa5d97df244d159dd6e 0626e6641f6b467447c81dd7678a69c66f7746cf < 1193486dffb7432a09f57f5d09049b4d4123538b 0626e6641f6b467447c81dd7678a69c66f7746cf < 076f1adefb9837977af7ed233883842ddc446644 0626e6641f6b467447c81dd7678a69c66f7746cf < 7ac5b66acafcc9292fb935d7e03790f2b8b2dc0e
Linux / Linux
5.15
References
git.kernel.org: https://git.kernel.org/stable/c/281afc52e2961cd5dd8326ebc9c5bc40904c0468 git.kernel.org: https://git.kernel.org/stable/c/0902625a24eea7fdc187faa5d97df244d159dd6e git.kernel.org: https://git.kernel.org/stable/c/1193486dffb7432a09f57f5d09049b4d4123538b git.kernel.org: https://git.kernel.org/stable/c/076f1adefb9837977af7ed233883842ddc446644 git.kernel.org: https://git.kernel.org/stable/c/7ac5b66acafcc9292fb935d7e03790f2b8b2dc0e zerodayinitiative.com: https://www.zerodayinitiative.com/advisories/ZDI-25-610/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html