Bug 2155943 (CVE-2022-47939, ZDI-22-1690, ZDI-CAN-17816) - CVE-2022-47939 kernel: smb2_tree_disconnect() fails to validate object existance prior to performing opertions on it
Summary: CVE-2022-47939 kernel: smb2_tree_disconnect() fails to validate object exista...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-47939, ZDI-22-1690, ZDI-CAN-17816
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2155948
Blocks: 2155936
TreeView+ depends on / blocked
 
Reported: 2022-12-23 01:16 UTC by Michael Kaplan
Modified: 2023-04-28 19:23 UTC (History)
39 users (show)

Fixed In Version: kernel 6.0-rc1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-12-24 14:08:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Michael Kaplan 2022-12-23 01:16:14 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

Comment 1 Michael Kaplan 2022-12-23 01:18:37 UTC
References: 

https://www.zerodayinitiative.com/advisories/ZDI-22-1690/

Comment 2 Michael Kaplan 2022-12-23 02:02:06 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2155948]

Comment 5 Sandipan Roy 2022-12-23 05:07:08 UTC
There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.

Comment 8 Product Security DevOps Team 2022-12-24 14:08:00 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-47939


Note You need to log in before you can comment on or make changes to this bug.