Kernel: oob access in smb2_dump_detail
CVE-2023-6610

7.1HIGH

Summary

An out-of-bounds read vulnerability has been identified in the SMB2 client functionality of the Linux Kernel, specifically within the smb2_dump_detail function located in the fs/smb/client/smb2ops.c file. This issue poses a risk that could be exploited by local attackers to potentially crash the affected system or leak sensitive internal information from the kernel memory. It is advisable for system administrators and users to apply necessary patches to safeguard against this vulnerability.

Affected Version(s)

Red Hat Enterprise Linux 8 0:4.18.0-513.18.1.rt7.320.el8_9

Red Hat Enterprise Linux 8 0:4.18.0-513.18.1.el8_9

Red Hat Enterprise Linux 8.6 Extended Update Support 0:4.18.0-372.91.1.el8_6

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.