An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2024:0723 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:0725 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:0881 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:0897 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:1188 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:1248 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:1404 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2024:2094 | Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2023-6606 | Third Party Advisory |
https://bugzilla.kernel.org/show_bug.cgi?id=218218 | Exploit Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=2253611 | Exploit Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
25 Oct 2024, 16:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Eus
Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Redhat enterprise Linux Server Aus |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:* |
|
References | () https://access.redhat.com/errata/RHSA-2024:0723 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0725 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0881 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0897 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1188 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1248 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:1404 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2094 - Third Party Advisory |
14 Sep 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Mar 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Mar 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Feb 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Dec 2023, 20:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2023-6606 - Third Party Advisory | |
References | () https://bugzilla.kernel.org/show_bug.cgi?id=218218 - Exploit, Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253611 - Exploit, Issue Tracking | |
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
08 Dec 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-08 17:15
Updated : 2024-10-25 16:37
NVD link : CVE-2023-6606
Mitre link : CVE-2023-6606
CVE.ORG link : CVE-2023-6606
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- enterprise_linux_eus
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read