CVE-2023-52442
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/02/2024
Last modified:
12/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: validate session id and tree id in compound request<br />
<br />
`smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session()<br />
will always return the first request smb2 header in a compound request.<br />
if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will<br />
return 0, i.e. The tree id check is skipped.<br />
This patch use ksmbd_req_buf_next() to get current command in compound.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.145 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.53 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.4.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
- https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
- https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
- https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f
- https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
- https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
- https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
- https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f