A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
References
| Link | Resource |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-CAN-20596/ | Patch Third Party Advisory VDB Entry |
| https://bugzilla.redhat.com/show_bug.cgi?id=2219806 | Issue Tracking Patch Third Party Advisory |
| https://access.redhat.com/security/cve/CVE-2023-32257 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20230915-0011/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2023-07-24 16:15
Updated : 2023-12-22 17:06
NVD link : CVE-2023-32257
Mitre link : CVE-2023-32257
JSON object : View
Products Affected
netapp
- h500s
- h700s
- h300s
- h410s
- solidfire_\&_hci_storage_node
linux
- linux_kernel
CWE
CWE-667
Improper Locking
