{"id":"CVE-2023-6606","details":"An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.","modified":"2026-03-13T07:50:45.448656Z","published":"2023-12-08T17:15:07.733Z","related":["ALSA-2024:0897","SUSE-SU-2024:0110-1","SUSE-SU-2024:0112-1","SUSE-SU-2024:0113-1","SUSE-SU-2024:0115-1","SUSE-SU-2024:0117-1","SUSE-SU-2024:0118-1","SUSE-SU-2024:0120-1","SUSE-SU-2024:0129-1","SUSE-SU-2024:0141-1","SUSE-SU-2024:0153-1","SUSE-SU-2024:0154-1","SUSE-SU-2024:0156-1","SUSE-SU-2024:0160-1","SUSE-SU-2025:0834-1","openSUSE-SU-2024:13547-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0723"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1188"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0725"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0881"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0897"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1404"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-6606"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253611"},{"type":"REPORT","url":"https://bugzilla.kernel.org/show_bug.cgi?id=218218"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"6.4.1"},{"fixed":"6.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4-rc7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.7-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.4"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.4"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2_ppc64le"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6606.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}