Medium severity5.5NVD Advisory· Published Aug 19, 2025· Updated Apr 18, 2026
CVE-2025-38562
CVE-2025-38562
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix null pointer dereference error in generate_encryptionkey
If client send two session setups with krb5 authenticate to ksmbd, null pointer dereference error in generate_encryptionkey could happen. sess->Preauth_HashValue is set to NULL if session is valid. So this patch skip generate encryption key if session is valid.
Affected products
2- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Patches
696a82e19434ad79c8bebaa622a30ed6428ce015ef163d6549c2dbbc959e19b493ab6f351Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- www.zerodayinitiative.com/advisories/ZDI-25-917/nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.