A flaw was found in the Linux kernels ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 5.15 (including) | 5.15.111 (excluding) |
Linux_kernel | Linux | 5.16 (including) | 6.1.28 (excluding) |
Linux_kernel | Linux | 6.2 (including) | 6.2.15 (excluding) |
Linux_kernel | Linux | 6.3 (including) | 6.3.2 (excluding) |