First published: Fri Apr 28 2023(Updated: )
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.4 | 6.4 |
Linux Kernel | >=5.15<5.15.145 | |
Linux Kernel | >=5.16<6.1.28 | |
Linux Kernel | >=6.2<6.2.15 | |
Linux Kernel | >=6.3<6.3.2 | |
netapp hci management node | ||
netapp h300s | ||
netapp h410s | ||
netapp h500s | ||
netapp h700s | ||
Linux Kernel | <6.4 | |
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32254 is classified as a high severity vulnerability due to its potential to allow unauthorized access via improperly locked operations.
To mitigate CVE-2023-32254, update to the latest kernel versions as recommended by your Linux distribution, specifically versions 6.4 or patched versions of earlier kernels.
CVE-2023-32254 affects various versions of the Linux kernel, specifically those between 5.15.0 and 6.4.
CVE-2023-32254 is a locking flaw in the Linux kernel's ksmbd SMB server that can be exploited through the processing of SMB2_TREE_DISCONNECT commands.
CVE-2023-32254 was reported through security advisories and tracked by the Zero Day Initiative.