Bugzilla – Bug 1213542
VUL-0: kernel-source,kernel-source-azure,kernel-source-rt: ksmbd Chained Request NULL Pointer Dereference Denial-of-Service Vulnerability
Last modified: 2024-05-22 11:07:28 UTC
ZDI-23-979 This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. The specific flaw exists within the handling of chained requests. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. References: https://www.zerodayinitiative.com/advisories/ZDI-23-979/
ksmbd is only built in stable, which already has the fix
(In reply to Thomas Leroy from comment #1) > ksmbd is only built in stable, which already has the fix Confirmed stable is v6.4. R(In reply to Thomas Leroy from comment #1) > ksmbd is only built in stable, which already has the fix commit 5005bcb4219156f1bf7587b185080ec1da08518e [v6.4~32^2] Author: Namjae Jeon <linkinjeon@kernel.org> Date: Thu Jun 15 22:05:29 2023 +0900 ksmbd: validate session id and tree id in the compound request Update status: stable [v6.4, already included] Reset assigner
closing