First published: Tue Jul 18 2023(Updated: )
An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.3.8 | |
Linux Kernel | >=5.15<5.15.145 | |
Linux Kernel | >=5.16<6.1.34 | |
Linux Kernel | >=6.2<6.3.8 | |
NetApp SolidFire & HCI Management Node | ||
NetApp H300S Firmware | ||
NetApp H410S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38431 has a high severity rating due to the out-of-bounds read vulnerability in the Linux kernel's ksmbd component.
To fix CVE-2023-38431, it is recommended to update the Linux kernel to versions 5.15.145, 6.1.34, or 6.3.8 and later.
CVE-2023-38431 affects Linux kernel versions before 6.3.8, specifically those in the ranges 5.15.x and 5.16.x to 6.2.x.
Yes, CVE-2023-38431 also affects various NetApp hardware including the SolidFire & HCI Management Node and the H300s, H410s, H500s, and H700s models.
The potential impact of CVE-2023-38431 includes unauthorized reading of memory data, which could lead to exposure of sensitive information.