Impact
This flaw in the Linux kernel’s ksmbd module allows a remote actor to provoke the expiration of any active SMB session by sending a binding request with an incorrect password. The error path sets the referenced session’s state to expired even when the session belongs to another user’s connection, effectively invalidating that user’s session without local privileges.
Affected Systems
Any Linux kernel build containing the unpatched ksmbd component is vulnerable; the provided CPE list covers all kernels, including current stable versions such as 5.15 and the 7.0 release candidates. The fix is present only in newer kernel releases that incorporate the commit resolving this defect.
Risk and Exploitability
An attacker can exploit the vulnerability over the network on the SMB service and does not need prior authentication. The CVSS score is 8.2, indicating high severity, while the EPSS score is below 1%, showing a low but non‑zero probability of exploitation. The vulnerability is not listed as a Known Exploited Vulnerability in the CISA catalog.
OpenCVE Enrichment
Debian DLA
Debian DSA