A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion.
[ { "signature_type": "Function", "id": "CVE-2023-32255-5bd7121b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@6d7cb549c2ca20e1f07593f15e936fd54b763028", "signature_version": "v1", "target": { "function": "smb2_sess_setup", "file": "fs/ksmbd/smb2pdu.c" }, "digest": { "function_hash": "192602137247297597180800683683577217471", "length": 4486.0 }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2023-32255-c3e09757", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@6d7cb549c2ca20e1f07593f15e936fd54b763028", "signature_version": "v1", "target": { "file": "fs/ksmbd/smb2pdu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "225636643417979065393269825784553769669", "330282806774438128348951454273516373212", "86197794521650905881750452979583563517", "108554792269675009194453485470297114511" ] }, "deprecated": false } ]