First published: Wed Jul 05 2023(Updated: )
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.4 | 6.4 |
Linux Kernel | >=5.15<5.15.145 | |
Linux Kernel | >=5.16<6.1.29 | |
Linux Kernel | >=6.2<6.2.16 | |
Linux Kernel | >=6.3<6.3.2 | |
netapp h300s | ||
netapp h410s | ||
netapp h500s | ||
netapp h700s | ||
Linux Kernel | <=6.3.9 | |
Linux kernel | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32258 has a high severity rating due to the potential for unauthorized access and system disruption.
To fix CVE-2023-32258, update your Linux kernel to versions 6.4 or above, or to the specific patched versions available from your distribution.
CVE-2023-32258 affects various versions of the Linux kernel, particularly those between 5.15 and 6.3.9.
Organizations using the affected versions of the Linux kernel in their environments could be impacted by CVE-2023-32258.
An attacker could exploit CVE-2023-32258 to gain unauthorized access to sensitive data or disrupt SMB operations.