In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix null pointer dereference in destroy_previous_sessionIf client set ->PreviousSessionId on kerberos session setup stage,NULL pointer dereference error will happen. Since sess->user is notset yet, It can pass the user argument as NULL to destroy_previous_session.sess->user will be set in ksmbd_krb5_authenticate(). So this patch movecalling destroy_previous_session() after ksmbd_krb5_authenticate().
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/w4zu/Debian_security