CVE-2023-3867
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out of bounds (OOB) read issue in the Linux kernel's ksmbd component. It occurs during the processing of smb2 session setup requests when these requests are part of a compound request. Specifically, if the smb2 session setup is the second payload in the compound request, the code does not properly handle this case, leading to an out of bounds read while processing the first payload.
How can this vulnerability impact me? :
An out of bounds read vulnerability can potentially lead to information disclosure or cause the system to crash, depending on how the memory is accessed. In this case, it may allow an attacker to read unintended memory areas during smb2 session setup processing, which could compromise system stability or leak sensitive information.