In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix null pointer dereference in destroyprevioussession
If client set ->PreviousSessionId on kerberos session setup stage, NULL pointer dereference error will happen. Since sess->user is not set yet, It can pass the user argument as NULL to destroyprevioussession. sess->user will be set in ksmbdkrb5authenticate(). So this patch move calling destroyprevioussession() after ksmbdkrb5authenticate().
[
{
"id": "CVE-2025-38191-01d38d24",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0902625a24eea7fdc187faa5d97df244d159dd6e",
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "krb5_authenticate"
},
"deprecated": false,
"digest": {
"length": 1898.0,
"function_hash": "65187102292986694294832691272323314660"
},
"signature_version": "v1"
},
{
"id": "CVE-2025-38191-081f2dad",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0902625a24eea7fdc187faa5d97df244d159dd6e",
"target": {
"file": "fs/smb/server/smb2pdu.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"258851731131085647093923108328412599730",
"306987372611713024551187221182523311675",
"38228239249280592730582068899270214375",
"124169950981745275608857658335085458184",
"70130469931562836358343187887813255891",
"162802107769930329081537838775273995742",
"183053839215811633033298773914774875402",
"128722536667771889275217505140494880681",
"85743103373558097548770766827209125268",
"233148799002903137602919223062915982892",
"202615036838454715494488727713124081666",
"253348153867824691062950421775322087353"
],
"threshold": 0.9
},
"signature_version": "v1"
}
]