« List of all CVEs

CVE-2023-32252

Session null pointer dereference denial-of-service vulnerability

Published: 7/24/2023 Last updated: 8/2/2024 Reserved: 5/5/2023

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 7.5 High CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Opam packages affected (29)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes ortools_solvers orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (6)

Product Vendor Version
Red Hat Enterprise Linux 9 Red Hat < 6ca3d4d87af406a390a34ea924ab65c517e6e132
Fedora Fedora < 363236d709e75610b628c2a4337ccbe42e454b6d
Red Hat Enterprise Linux 7 Red Hat <= 7.37.1
Red Hat Enterprise Linux 8 Red Hat < 7a7ada33879a631b05b536e66d1c5b1219d3bade
Red Hat Enterprise Linux 9 Red Hat < 920ea73215dbf948b661b88a79cb47b7f96adfbd
Red Hat Enterprise Linux 9 Red Hat <= 7.37.0

References (16)