CVE-2023-38431
CBL Mariner vulnerability analysis and mitigation

Overview

A vulnerability was discovered in the Linux kernel before version 6.3.8, identified as CVE-2023-38431. The issue exists in fs/smb/server/connection.c where the ksmbd component fails to properly validate the relationship between the NetBIOS header's length field and the SMB header sizes, specifically through pdusize in ksmbdconnhandlerloop, leading to an out-of-bounds read vulnerability (NVD, Ubuntu).

Technical details

The vulnerability stems from improper validation of packet header sizes in the KSMBD implementation. If pdu_size is 0, ksmbd allocates a 4-byte chunk to conn->request_buf. When the function get_smb2_cmd_val attempts to read the command from rcv_hdr->Command (which is conn->request_buf + 12), it results in an out-of-bounds read. The length field of the NetBIOS header must be greater than the SMB header sizes (SMB1 or SMB2 header); otherwise, the packet is considered invalid. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.1 (CRITICAL) with the vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H (Kernel Patch).

Impact

A successful exploitation of this vulnerability could allow a remote attacker to cause a denial of service (system crash) or potentially expose sensitive information. The vulnerability affects systems running Linux kernel versions prior to 6.3.8 that have the KSMBD feature enabled (Ubuntu, NetApp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel version 6.3.8. The fix includes adding proper validation checks for the pdusize in ksmbdconnhandlerloop to ensure it is greater than the minimum supported header size for both SMB1 and SMB2 protocols. Users are advised to upgrade to Linux kernel version 6.3.8 or later to address this vulnerability (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • kubeflow-centraldashboard
NoYesNov 26, 2025
CVE-2025-12638HIGH8
  • CBL MarinerCBL Mariner
  • keras
NoYesNov 28, 2025
CVE-2025-13601HIGH7.7
  • CBL MarinerCBL Mariner
  • glib2-fam
NoYesNov 26, 2025
CVE-2025-66293HIGH7.1
  • OpenJDK JDKOpenJDK JDK
  • java-17-openjdk-jmods
NoYesDec 03, 2025
CVE-2025-66030MEDIUM6.3
  • JavaScriptJavaScript
  • reaper
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management