In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate session id and tree id in the compound request
This patch validate session id and tree id in compound request. If first operation in the compound is SMB2 ECHO request, ksmbd bypass session and tree validation. So work->sess and work->tcon could be NULL. If secound request in the compound access work->sess or tcon, It cause NULL pointer dereferecing error.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/3xxx/CVE-2023-3866.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3866.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@854156d12caa9d36de1cf5f084591c7686cc8a9d",
"digest": {
"line_hashes": [
"267242770938056707685734820599829800749",
"291800898915931027443665200663440822535",
"1284858620700519204524976307979858318",
"287456224673710019090457876668619593140",
"200216563264256439142659459251517555664",
"99908170931663940424761157640203870596",
"27741602090142187058648638301037587493",
"291813553625938596167011780204210591299",
"48986189948527503971952488597098366038",
"71213142967054930950841377869500280622",
"67449277874346076267028449647186358003",
"18558859952585831897674541591496019890",
"158237971288520947933486848813701798441",
"150121467915037224418266654940488836124",
"270131202633379580848013588943467073525",
"134424682372636945666866844109924004751",
"338658923237748833725704714425239532555",
"47798365528593122425948200981551362332",
"257514322129342949052191618997009976472",
"131125023786940800632023894110445593396",
"133386468890301905080126437118760078992",
"78295184216052625710784499611708833663",
"190462755204058514606693048621684279676",
"277765686370586621393294564203138825910",
"5609077463187768930044564356096404188",
"239534310717662232206936298640361912316"
],
"threshold": 0.9
},
"id": "CVE-2023-3866-20ce6acf",
"deprecated": false,
"target": {
"file": "fs/ksmbd/smb2pdu.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@854156d12caa9d36de1cf5f084591c7686cc8a9d",
"digest": {
"line_hashes": [
"19377509034539034966105917485935205732",
"296426338255953836383852185467717717033",
"170138534016413696835862443013351789014",
"336060456380232932285749309586024813973",
"118683840042434214708825899470617812721",
"239587488263740324810916160248675910279",
"134738505580861096318761602512464798577",
"238302778316225268898378557513033399366",
"121831217648899347259694606151718407508",
"67039376667685660764847743763588385106",
"328319207426412413267213728004270223561",
"8532172087941725979342575608489578276",
"236726211491082952308401550505440857813",
"290840767088519689156318632112194810364",
"204875600737447811316108661738911348082",
"260524006171949445179576645680397931947",
"8127631615736030531485837480603898204",
"252574485712969882390480168183888526887",
"301704517585018280066019842031034975450",
"131957988345946097008730356141031115397"
],
"threshold": 0.9
},
"id": "CVE-2023-3866-2ea38f9b",
"deprecated": false,
"target": {
"file": "fs/ksmbd/server.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@854156d12caa9d36de1cf5f084591c7686cc8a9d",
"digest": {
"function_hash": "2877946218821253804395747297594387326",
"length": 643.0
},
"id": "CVE-2023-3866-4032cf20",
"deprecated": false,
"target": {
"file": "fs/ksmbd/smb2pdu.c",
"function": "smb2_get_ksmbd_tcon"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@854156d12caa9d36de1cf5f084591c7686cc8a9d",
"digest": {
"function_hash": "1039125785357466364743701976815573287",
"length": 1861.0
},
"id": "CVE-2023-3866-b795f845",
"deprecated": false,
"target": {
"file": "fs/ksmbd/server.c",
"function": "__handle_ksmbd_work"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@854156d12caa9d36de1cf5f084591c7686cc8a9d",
"digest": {
"function_hash": "51658026496125893869267915930610721970",
"length": 551.0
},
"id": "CVE-2023-3866-f20da448",
"deprecated": false,
"target": {
"file": "fs/ksmbd/smb2pdu.c",
"function": "smb2_check_user_session"
}
}
]