In the Linux kernel, the following vulnerability has been resolved: ksmbd:
validate session id and tree id in compound request smb2_get_msg()
in
smb2_get_ksmbd_tcon() and smb2_check_user_session() will always return the
first request smb2 header in a compound request. if SMB2_TREE_CONNECT_HE
is the first command in compound request, will return 0, i.e. The tree id
check is skipped. This patch use ksmbd_req_buf_next() to get current
command in compound.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-102.112 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1057.63 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1057.63~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
git.kernel.org/linus/3df0411e132ee74a87aa13142dfd2b190275332e (6.5-rc4)
git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f
launchpad.net/bugs/cve/CVE-2023-52442
nvd.nist.gov/vuln/detail/CVE-2023-52442
security-tracker.debian.org/tracker/CVE-2023-52442
ubuntu.com/security/notices/USN-6725-1
ubuntu.com/security/notices/USN-6725-2
www.cve.org/CVERecord?id=CVE-2023-52442