An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-1194 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2154176 | third party advisory issue tracking |
https://www.spinics.net/lists/stable-commits/msg303065.html | patch mailing list |
https://security.netapp.com/advisory/ntap-20231221-0006/ | third party advisory |