In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate session id and tree id in the compound request
This patch validate session id and tree id in compound request.
If first operation in the compound is SMB2 ECHO request, ksmbd bypass
session and tree validation. So work->sess and work->tcon could be NULL.
If secound request in the compound access work->sess or tcon, It cause
NULL pointer dereferecing error.
ksmbd: validate session id and tree id in the compound request
This patch validate session id and tree id in compound request.
If first operation in the compound is SMB2 ECHO request, ksmbd bypass
session and tree validation. So work->sess and work->tcon could be NULL.
If secound request in the compound access work->sess or tcon, It cause
NULL pointer dereferecing error.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-6416-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6416-3 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6464-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6520-1 | Linux kernel (StarFive) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-476 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Mon, 18 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Vendors & Products |
Linux
Linux linux Kernel |
Sat, 16 Aug 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in the compound request This patch validate session id and tree id in compound request. If first operation in the compound is SMB2 ECHO request, ksmbd bypass session and tree validation. So work->sess and work->tcon could be NULL. If secound request in the compound access work->sess or tcon, It cause NULL pointer dereferecing error. | |
| Title | ksmbd: validate session id and tree id in the compound request | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-08-19T05:47:13.303Z
Reserved: 2023-07-24T14:52:41.881Z
Link: CVE-2023-3866
No data.
Status : Analyzed
Published: 2025-08-16T14:15:27.383
Modified: 2025-11-18T17:58:12.250
Link: CVE-2023-3866
No data.
OpenCVE Enrichment
Updated: 2025-08-18T20:49:59Z
Ubuntu USN