A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion.
[
{
"id": "CVE-2023-32255-5bd7121b",
"signature_type": "Function",
"digest": {
"length": 4486.0,
"function_hash": "192602137247297597180800683683577217471"
},
"target": {
"file": "fs/ksmbd/smb2pdu.c",
"function": "smb2_sess_setup"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@6d7cb549c2ca20e1f07593f15e936fd54b763028",
"signature_version": "v1",
"deprecated": false
},
{
"id": "CVE-2023-32255-c3e09757",
"signature_type": "Line",
"digest": {
"line_hashes": [
"225636643417979065393269825784553769669",
"330282806774438128348951454273516373212",
"86197794521650905881750452979583563517",
"108554792269675009194453485470297114511"
],
"threshold": 0.9
},
"target": {
"file": "fs/ksmbd/smb2pdu.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@6d7cb549c2ca20e1f07593f15e936fd54b763028",
"signature_version": "v1",
"deprecated": false
}
]