
Cloud Vulnerability DB
A community-led vulnerabilities database
An out-of-bounds read vulnerability was discovered in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. The vulnerability was disclosed on December 8, 2023, and affects the Linux Kernel's CIFS client implementation. This vulnerability is tracked as CVE-2023-6610 and has been assigned a CVSS v3.1 base score of 7.1 (High) (NVD, Red Hat).
The vulnerability occurs when CONFIG_CIFS_DEBUG2 is enabled and the cifs_demultiplex_thread calls dump_detail. In smb2_dump_detail, the calc_smb_size function is called, which refers to smb2_calc_size. The issue arises in has_smb2_data_area where it attempts to retrieve an element at the index le16_to_cpu(shdr->Command). If a value larger than the length of has_smb2_data_area is input, an out-of-bounds read occurs (Kernel Bugzilla).
This vulnerability could allow a local attacker to crash the system or leak internal kernel information. The severity is rated as High due to the potential for system crashes and information disclosure (NVD).
The vulnerability has been fixed in the Linux kernel through commit 567320c46a60 titled 'smb: client: fix potential OOB in smb2_dump_detail()'. Multiple Linux distributions have released security updates to address this vulnerability, including Red Hat Enterprise Linux through various security advisories (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."