A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-32252 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2219815 | Issue Tracking Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20231124-0001/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20590/ | Patch Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2023-07-24 16:15
Updated : 2023-12-04 14:53
NVD link : CVE-2023-32252
Mitre link : CVE-2023-32252
CVE.ORG link : CVE-2023-32252
JSON object : View
Products Affected
netapp
- h300s_firmware
- h410c_firmware
- h410s_firmware
- h410c
- h500s_firmware
- h500s
- h700s_firmware
- h300s
- h700s
- h410s
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference