In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate session id and tree id in the compound request
This patch validate session id and tree id in compound request.
If first operation in the compound is SMB2 ECHO request, ksmbd bypass
session and tree validation. So work->sess and work->tcon could be NULL.
If secound request in the compound access work->sess or tcon, It cause
NULL pointer dereferecing error.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Sat, 16 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in the compound request This patch validate session id and tree id in compound request. If first operation in the compound is SMB2 ECHO request, ksmbd bypass session and tree validation. So work->sess and work->tcon could be NULL. If secound request in the compound access work->sess or tcon, It cause NULL pointer dereferecing error. | |
Title | ksmbd: validate session id and tree id in the compound request | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-08-19T05:47:13.303Z
Reserved: 2023-07-24T14:52:41.881Z
Link: CVE-2023-3866

No data.

Status : Awaiting Analysis
Published: 2025-08-16T14:15:27.383
Modified: 2025-08-18T20:16:28.750
Link: CVE-2023-3866

No data.