First published: Sun May 21 2023(Updated: )
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.4 | 6.4 |
Linux kernel | <6.4 | |
Red Hat Kernel-devel | ||
Linux Kernel | <6.4 | |
Linux Kernel | >=5.15<5.15.145 | |
Linux Kernel | >=5.16<6.1.29 | |
Linux Kernel | >=6.2<6.2.16 | |
Linux Kernel | >=6.3<6.3.2 | |
NetApp HCI | ||
NetApp HCI Storage Node | ||
NetApp H300S Firmware | ||
NetApp H410S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32250 has been classified as a high severity vulnerability due to its potential impact on systems running the affected versions of the Linux kernel.
To fix CVE-2023-32250, upgrade to kernel versions 5.10.223-1, 5.10.226-1, 6.1.119-1, or later patched releases.
CVE-2023-32250 affects Linux kernel versions from 5.15.0 up to but not including 6.4.
Yes, CVE-2023-32250 can be exploited remotely if the affected system is accessible over the network.
CVE-2023-32250 specifically impacts the ksmbd, which is a high-performance in-kernel SMB server.