vulnerability
Ubuntu: (Multiple Advisories) (CVE-2023-3866): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Oct 4, 2023 | Oct 6, 2023 | Mar 27, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Oct 4, 2023
Added
Oct 6, 2023
Modified
Mar 27, 2026
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate session id and tree id in the compound request
This patch validate session id and tree id in compound request.
If first operation in the compound is SMB2 ECHO request, ksmbd bypass
session and tree validation. So work->sess and work->tcon could be NULL.
If secound request in the compound access work->sess or tcon, It cause
NULL pointer dereferecing error.
Solutions
ubuntu-upgrade-linux-image-5-15-0-1030-gkeopubuntu-upgrade-linux-image-5-15-0-1037-nvidiaubuntu-upgrade-linux-image-5-15-0-1037-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1040-ibmubuntu-upgrade-linux-image-5-15-0-1040-raspiubuntu-upgrade-linux-image-5-15-0-1043-intel-iotgubuntu-upgrade-linux-image-5-15-0-1044-gcpubuntu-upgrade-linux-image-5-15-0-1044-gkeubuntu-upgrade-linux-image-5-15-0-1044-kvmubuntu-upgrade-linux-image-5-15-0-1045-oracleubuntu-upgrade-linux-image-5-15-0-1047-awsubuntu-upgrade-linux-image-5-15-0-1049-azureubuntu-upgrade-linux-image-5-15-0-1049-azure-fdeubuntu-upgrade-linux-image-5-15-0-86-genericubuntu-upgrade-linux-image-5-15-0-86-generic-64kubuntu-upgrade-linux-image-5-15-0-86-generic-lpaeubuntu-upgrade-linux-image-5-15-0-86-lowlatencyubuntu-upgrade-linux-image-5-15-0-86-lowlatency-64kubuntu-upgrade-linux-image-6-2-0-1008-starfiveubuntu-upgrade-linux-image-6-2-0-1009-starfiveubuntu-upgrade-linux-image-6-2-0-1011-nvidiaubuntu-upgrade-linux-image-6-2-0-1011-nvidia-64kubuntu-upgrade-linux-image-6-2-0-1015-awsubuntu-upgrade-linux-image-6-2-0-1015-oracleubuntu-upgrade-linux-image-6-2-0-1016-azureubuntu-upgrade-linux-image-6-2-0-1016-azure-fdeubuntu-upgrade-linux-image-6-2-0-1016-kvmubuntu-upgrade-linux-image-6-2-0-1016-lowlatencyubuntu-upgrade-linux-image-6-2-0-1016-lowlatency-64kubuntu-upgrade-linux-image-6-2-0-1016-raspiubuntu-upgrade-linux-image-6-2-0-1018-gcpubuntu-upgrade-linux-image-6-2-0-36-genericubuntu-upgrade-linux-image-6-2-0-36-generic-64kubuntu-upgrade-linux-image-6-2-0-36-generic-lpaeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-fde-lts-22-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-6-2ubuntu-upgrade-linux-image-nvidia-64k-6-2ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04ubuntu-upgrade-linux-image-nvidia-hwe-22-04ubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-starfiveubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.