CVE-2023-52434Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Severity
8.0HIGHNVD
OSV8.8OSV7.8OSV7.5OSV7.1OSV7.0OSV6.5OSV5.5
EPSS
0.1%
top 73.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 20
Latest updateJan 9

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when accessing invalid create contexts from server: BUG: unable to handle page fault for address: ffff8881178d8cc3 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 4a01067 P4D 4a01067 PUD 0 Oops: 0000 [#1] PREEMP

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages9 packages

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

22
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
linux-azure vulnerabilities2024-11-20
OSV
linux-raspi-5.4 vulnerabilities2024-08-22
OSV
linux-bluefield vulnerabilities2024-08-21
OSV
linux-azure-5.4 vulnerabilities2024-08-19

📋Vendor Advisories

23
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Linux kernel (Azure) vulnerabilities2024-11-20
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2024-08-22
Ubuntu
Linux kernel (BlueField) vulnerabilities2024-08-21
Ubuntu
Linux kernel (Azure) vulnerabilities2024-08-19

💬Community

1
Bugzilla
CVE-2023-52434 kernel: smb: client: fix potential OOBs in smb2_parse_contexts()2024-02-21