CVE-2023-6606
Kernel: out-of-bounds read vulnerability in smbcalcsize
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
Se encontró una vulnerabilidad de lectura fuera de los límites en smbCalcSize en fs/smb/client/netmisc.c en el kernel de Linux. Este problema podría permitir que un atacante local bloquee el sistema o filtre información interna del kernel.
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information. Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-12-08 CVE Reserved
- 2023-12-08 CVE Published
- 2024-11-15 CVE Updated
- 2024-11-15 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html |
|
|
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html |
|
URL | Date | SRC |
---|---|---|
https://bugzilla.kernel.org/show_bug.cgi?id=218218 | 2024-11-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2253611 | 2024-11-15 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:0723 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:0725 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:0881 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:0897 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:1188 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:1248 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:1404 | 2024-07-08 | |
https://access.redhat.com/errata/RHSA-2024:2094 | 2024-07-08 | |
https://access.redhat.com/security/cve/CVE-2023-6606 | 2024-05-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Affected
|