The ksmbd server through 3.4.2, as used in the Linux...
High severity
Unreviewed
Published
Dec 17, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Dec 16, 2021
Published to the GitHub Advisory Database
Dec 17, 2021
Last updated
Feb 1, 2023
The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.
References