CVE-2023-38427
CBL Mariner vulnerability analysis and mitigation

Overview

An integer underflow and out-of-bounds read vulnerability was discovered in the Linux kernel before version 6.3.8. The vulnerability specifically affects the deassemblenegcontexts function in fs/smb/server/smb2pdu.c within the ksmbd component. This vulnerability was assigned CVE-2023-38427 and was disclosed on July 17, 2023. The vulnerability affects various Linux kernel versions from 5.15 up to versions before 6.3.8 (NVD, Kernel Patch).

Technical details

The vulnerability stems from an incorrect check in the deassemblenegcontexts function. The initial check 'clen + sizeof(struct smb2negcontext) <= lenofctxts' is problematic because at the end of the loop, lenofctxts subtracts '((clen + 7) & ~0x7) + sizeof(struct smb2negcontext)', which can cause an integer underflow when clen undergoes 8-byte alignment. The issue was fixed by using '(clen + 7) & ~0x7' in the check to prevent underflow and by changing certain variables from signed to unsigned. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

When successfully exploited, this vulnerability could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The high CVSS score indicates critical severity with potential for complete compromise of system confidentiality, integrity, and availability (NetApp Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Linux kernel version 6.3.8 or later, which contains the fix for this vulnerability. The patch modifies the deassemblenegcontexts function to properly handle buffer size validation and prevent integer underflow. For systems that cannot be immediately updated, no alternative workarounds have been publicly documented (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62689HIGH8.7
  • NixOSNixOS
  • libmicrohttpd-devel
NoYesNov 10, 2025
CVE-2025-59777HIGH8.7
  • NixOSNixOS
  • libmicrohttpd-doc
NoYesNov 10, 2025
CVE-2025-47913HIGH7.5
  • PackerPacker
  • container-tools:rhel8::buildah-tests
NoYesNov 13, 2025
CVE-2024-47866HIGH7.5
  • CBL MarinerCBL Mariner
  • ceph
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management