« List of all CVEs

CVE-2023-32247

Session setup memory exhaustion denial-of-service vulnerability

Published: 7/24/2023 Last updated: 8/2/2024 Reserved: 5/5/2023

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 7.5 High CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Opam packages affected (29)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes ortools_solvers orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (9)

Product Vendor Version
Fedora Fedora <= 6.1.*
Red Hat Enterprise Linux 6 Red Hat < 38d9b07d99b789efb6d8dda21f1aaad636c38993
Red Hat Enterprise Linux 7 Red Hat < 2e6871a632a99d9b9e2ce3a7847acabe99e5a26e
Red Hat Enterprise Linux 8 Red Hat 4.16
Red Hat Enterprise Linux 9 Red Hat <= 5.10.*
Red Hat Enterprise Linux 8 Red Hat < 4.16
Red Hat Enterprise Linux 7 Red Hat < 77d48d39e99170b528e4f2e9fc5d1d64cdedd386
Red Hat Enterprise Linux 9 Red Hat <= 5.15.*
kernel n/a < 19fd2f2c5fb36b61506d3208474bfd8fdf1cada3

References (16)