« List of all CVEs

CVE-2023-32250

Session race condition remote code execution vulnerability

Published: 7/10/2023 Last updated: 2/13/2025 Reserved: 5/5/2023

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 9 Critical CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (9)

Product Vendor Version
Fedora Fedora n/a
Red Hat Enterprise Linux 6 Red Hat n/a
Red Hat Enterprise Linux 7 Red Hat 10 Version 1803 for 32-bit Systems
Red Hat Enterprise Linux 8 Red Hat 10 Version 1803 for ARM64-based Systems
Red Hat Enterprise Linux 9 Red Hat n/a
Red Hat Enterprise Linux 8 Red Hat 13
Red Hat Enterprise Linux 7 Red Hat <= NEXO-OS V1500-SP2
Red Hat Enterprise Linux 9 Red Hat 12L
kernel n/a < *

References (8)