A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion.
{ "vanir_signatures": [ { "target": { "function": "smb2_sess_setup", "file": "fs/ksmbd/smb2pdu.c" }, "id": "CVE-2023-32255-5bd7121b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@6d7cb549c2ca20e1f07593f15e936fd54b763028", "digest": { "length": 4486.0, "function_hash": "192602137247297597180800683683577217471" }, "signature_version": "v1", "signature_type": "Function", "deprecated": false }, { "target": { "file": "fs/ksmbd/smb2pdu.c" }, "id": "CVE-2023-32255-c3e09757", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@6d7cb549c2ca20e1f07593f15e936fd54b763028", "digest": { "line_hashes": [ "225636643417979065393269825784553769669", "330282806774438128348951454273516373212", "86197794521650905881750452979583563517", "108554792269675009194453485470297114511" ], "threshold": 0.9 }, "signature_version": "v1", "signature_type": "Line", "deprecated": false } ] }