Количество 8
Количество 8
CVE-2025-38562
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid.
CVE-2025-38562
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid.
CVE-2025-38562
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid.
CVE-2025-38562
ksmbd: fix null pointer dereference error in generate_encryptionkey
CVE-2025-38562
In the Linux kernel, the following vulnerability has been resolved: k ...
GHSA-3qv5-2654-5g25
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid.
BDU:2025-10730
Уязвимость функции generate_encryptionkey() компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20260324-73-0002
Уязвимость kernel-lt
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38562 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid. | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-38562 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid. | 0% Низкий | 7 месяцев назад | ||
CVE-2025-38562 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid. | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-38562 ksmbd: fix null pointer dereference error in generate_encryptionkey | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
CVE-2025-38562 In the Linux kernel, the following vulnerability has been resolved: k ... | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
GHSA-3qv5-2654-5g25 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference error in generate_encryptionkey If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid. | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
BDU:2025-10730 Уязвимость функции generate_encryptionkey() компонента ksmbd ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 8 месяцев назад | |
ROS-20260324-73-0002 Уязвимость kernel-lt | CVSS3: 5.5 | 0% Низкий | 3 дня назад |
Уязвимостей на страницу