Not to be fixed
Created: Feb 21, 2024
Updated: Mar 7, 2024
Resolved Date: Mar 7, 2024
Found In Version: 10.19.45.1
Severity: Standard
Applicable for: Wind River Linux LTS 19
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate session id and tree id in compound request
`smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session()
will always return the first request smb2 header in a compound request.
if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will
return 0, i.e. The tree id check is skipped.
This patch use ksmbd_req_buf_next() to get current command in compound.
CREATE(Triage):(User=admin) CVE-2023-52442 (https://nvd.nist.gov/vuln/detail/CVE-2023-52442)