A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-32257 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2219806 | issue tracking patch third party advisory |
https://security.netapp.com/advisory/ntap-20230915-0011/ | third party advisory vdb entry |
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20596/ | vdb entry patch third party advisory |