CVE-2023-52442

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52442
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52442.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52442
Downstream
Published
2024-02-21T08:15:45Z
Modified
2025-10-01T19:15:33Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate session id and tree id in compound request

smb2_get_msg() in smb2getksmbdtcon() and smb2checkusersession() will always return the first request smb2 header in a compound request. if SMB2_TREE_CONNECT_HE is the first command in compound request, will return 0, i.e. The tree id check is skipped. This patch use ksmbdreqbuf_next() to get current command in compound.

References

Affected packages