We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in krb_authenticate krb_authenticate frees sess->user and does not set the pointer to NULL. It calls ksmbd_krb5_authenticate to reinitialise sess->user but that function may return without doing so. If that happens then smb2_sess_setup, which calls krb_authenticate, will be accessing free'd memory when it later uses sess->user.
Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/d5b554bc8d554ed6ddf443d3db2fad9f665cec10
git.kernel.org/...c/1db2451de23e98bc864c6a6e52aa0d82c91cb325
git.kernel.org/...c/6e30c0e10210c714f3d4453dc258d4abcc70364e
git.kernel.org/...c/e83e39a5f6a01a81411a4558a59a10f87aa88dd6
git.kernel.org/...c/1e440d5b25b7efccb3defe542a73c51005799a5f
Support options