In the Linux kernel, the following vulnerability has been resolved:ksmbd: validate session id and tree id in the compound requestThis patch validate session id and tree id in compound request.If first operation in the compound is SMB2 ECHO request, ksmbd bypasssession and tree validation. So work->sess and work->tcon could be NULL.If secound request in the compound access work->sess or tcon, It causeNULL pointer dereferecing error.
No PoCs from references.
- https://github.com/Notselwyn/exploits
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/xairy/linux-kernel-exploitation