Vulnerability Description
An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.15, < 5.15.145 |
| Fedoraproject | Fedora | 37 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2023-1194Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2154176Issue TrackingThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231221-0006/Third Party Advisory
- https://www.spinics.net/lists/stable-commits/msg303065.htmlMailing ListPatch
- https://access.redhat.com/security/cve/CVE-2023-1194Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2154176Issue TrackingThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231221-0006/Third Party Advisory
- https://www.spinics.net/lists/stable-commits/msg303065.htmlMailing ListPatch
FAQ
What is CVE-2023-1194?
CVE-2023-1194 is a vulnerability with a CVSS score of 7.1 (HIGH). An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command...
How severe is CVE-2023-1194?
CVE-2023-1194 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1194?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Fedoraproject Fedora.