First published: Thu May 04 2023(Updated: )
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.4 | 6.4 |
Linux Kernel | >=5.15<5.15.145 | |
Linux Kernel | >=5.16<6.1.29 | |
Linux Kernel | >=6.2<6.2.16 | |
Linux Kernel | >=6.3<6.3.2 | |
netapp solidfire \& hci storage node | ||
netapp h300s | ||
netapp h410s | ||
netapp h500s | ||
netapp h700s | ||
Linux Kernel | <=6.3.9 | |
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32257 has been classified with a high severity due to its potential impact on system security.
To resolve CVE-2023-32257, update to kernel versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, 6.12.11-1 or higher.
CVE-2023-32257 affects multiple versions of the Linux kernel, specifically those from 5.15 up to 6.3.9.
CVE-2023-32257 is a locking vulnerability that occurs during the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands.
Yes, CVE-2023-32257 can potentially be exploited remotely due to its nature in handling SMB commands.