In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix null pointer dereference in destroyprevioussession
If client set ->PreviousSessionId on kerberos session setup stage, NULL pointer dereference error will happen. Since sess->user is not set yet, It can pass the user argument as NULL to destroyprevioussession. sess->user will be set in ksmbdkrb5authenticate(). So this patch move calling destroyprevioussession() after ksmbdkrb5authenticate().
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38191.json"
}