-

CVE-2025-38562

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix null pointer dereference error in generate_encryptionkey

If client send two session setups with krb5 authenticate to ksmbd,
null pointer dereference error in generate_encryptionkey could happen.
sess->Preauth_HashValue is set to NULL if session is valid.
So this patch skip generate encryption key if session is valid.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 96a82e19434a2522525baab59c33332658bc7653
Version 0626e6641f6b467447c81dd7678a69c66f7746cf
Status affected
Version < d79c8bebaa622ee223128be7c66d8aaeeb634a57
Version 0626e6641f6b467447c81dd7678a69c66f7746cf
Status affected
Version < 2a30ed6428ce83afedca1a6c5c5c4247bcf12d0e
Version 0626e6641f6b467447c81dd7678a69c66f7746cf
Status affected
Version < 015ef163d65496ae3ba6192c96140a22743f0353
Version 0626e6641f6b467447c81dd7678a69c66f7746cf
Status affected
Version < 9c2dbbc959e1fcc6f603a1a843e9cf743ba383bb
Version 0626e6641f6b467447c81dd7678a69c66f7746cf
Status affected
Version < 9b493ab6f35178afd8d619800df9071992f715de
Version 0626e6641f6b467447c81dd7678a69c66f7746cf
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.15
Status affected
Version < 5.15
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.038
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string