« List of all CVEs

CVE-2023-32250

Session race condition remote code execution vulnerability

Published: 7/10/2023 Last updated: 2/13/2025 Reserved: 5/5/2023

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 9 Critical CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Opam packages affected (29)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes ortools_solvers orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (5)

Product Vendor Version
Red Hat Enterprise Linux 6 Red Hat <= 11.4
Red Hat Enterprise Linux 7 Red Hat db37dfc5c82f023a40f2f7834ded6633fb2b5262
Fedora Fedora < 2219e49857ffd6aea1b1ca5214d3270f84623a16
Red Hat Enterprise Linux 6 Red Hat <= <= 3.0.2
Red Hat Enterprise Linux 9 Red Hat < b49d224d1830c46e20adce2a239c454cdab426f1

References (16)