Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read in smb2_sess_setup ksmbd does not consider the case of that smb2 session setup is in compound request. If this is the second payload of the compound, OOB read issue occurs while processing the first payload in the smb2_sess_setup().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.15, < 5.15.145 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/2ba03cecb12ac7ac9e0170e251543c56832d9959Patch
- https://git.kernel.org/stable/c/676392184785ace61e939831e7ca44a03d438c3bPatch
- https://git.kernel.org/stable/c/98422bdd4cb3ca4d08844046f6507d7ec2c2b8d8Patch
- https://git.kernel.org/stable/c/ef572ffa8eb44111eed2925fbb2adca78bdcbf61Patch
FAQ
What is CVE-2023-3867?
CVE-2023-3867 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read in smb2_sess_setup ksmbd does not consider the case of that smb2 session setup is in compound reques...
How severe is CVE-2023-3867?
CVE-2023-3867 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3867?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.