« List of all CVEs

CVE-2023-32257

Session race condition remote code execution vulnerability

Published: 7/24/2023 Last updated: 8/2/2024 Reserved: 5/5/2023

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 8.1 High CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (9)

Product Vendor Version
Fedora Fedora < dd649b49219a0388cc10fc40e4c2ea681566a780
Red Hat Enterprise Linux 6 Red Hat 12.2(13)ZP4
Red Hat Enterprise Linux 7 Red Hat Windows Server 2012 R2
Red Hat Enterprise Linux 8 Red Hat 12.3(2)XA1
Red Hat Enterprise Linux 9 Red Hat Windows 10 Version 1607 for x64-based Systems
Red Hat Enterprise Linux 8 Red Hat < undefined
Red Hat Enterprise Linux 7 Red Hat 16.0.4
Red Hat Enterprise Linux 9 Red Hat < d9eb37db6a28b59a95a3461450ee209654c5f95b
kernel n/a n/a

References (8)