Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-32247

Опубликовано: 24 июл. 2023
Источник: debian

Описание

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.3.7-1package
linuxfixed6.1.37-1bookwormpackage
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://www.zerodayinitiative.com/advisories/ZDI-CAN-20478/

  • https://git.kernel.org/linus/ea174a91893956450510945a0c5d1a10b5323656 (6.4-rc1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

CVSS3: 7.5
redhat
больше 2 лет назад

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

CVSS3: 7.5
nvd
больше 2 лет назад

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

CVSS3: 7.5
msrc
больше 2 лет назад

Session setup memory exhaustion denial-of-service vulnerability

CVSS3: 7.5
github
больше 2 лет назад

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.