Bug 1213542

Summary: VUL-0: kernel-source,kernel-source-azure,kernel-source-rt: ksmbd Chained Request NULL Pointer Dereference Denial-of-Service Vulnerability
Product: [Novell Products] SUSE Security Incidents Reporter: Thomas Leroy <thomas.leroy>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: jlee, rfrohl, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/373140/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Thomas Leroy 2023-07-21 07:04:01 UTC
ZDI-23-979

This vulnerability allows remote attackers to create a denial-of-service
condition on affected installations of Linux Kernel. Authentication is not
required to exploit this vulnerability, but only systems with ksmbd enabled are
vulnerable.

The specific flaw exists within the handling of chained requests. The issue
results from dereferencing a NULL pointer. An attacker can leverage this
vulnerability to create a denial-of-service condition on the system.

References:
https://www.zerodayinitiative.com/advisories/ZDI-23-979/
Comment 1 Thomas Leroy 2023-07-21 07:04:55 UTC
ksmbd is only built in stable, which already has the fix
Comment 2 Joey Lee 2023-07-24 06:09:52 UTC
(In reply to Thomas Leroy from comment #1)
> ksmbd is only built in stable, which already has the fix

Confirmed stable is v6.4. R(In reply to Thomas Leroy from comment #1)
> ksmbd is only built in stable, which already has the fix

commit 5005bcb4219156f1bf7587b185080ec1da08518e         [v6.4~32^2]
Author: Namjae Jeon <linkinjeon@kernel.org>
Date:   Thu Jun 15 22:05:29 2023 +0900

    ksmbd: validate session id and tree id in the compound request

Update status:

stable    [v6.4, already included]

Reset assigner
Comment 3 Robert Frohl 2024-05-22 11:07:28 UTC
closing