{"api_version":"1","generated_at":"2026-04-22T23:52:38+00:00","cve":"CVE-2023-32254","urls":{"html":"https://cve.report/CVE-2023-32254","api":"https://cve.report/api/cve/CVE-2023-32254.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-32254","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-32254"},"summary":{"title":"CVE-2023-32254","description":"A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2023-07-10 16:15:00","updated_at":"2023-11-07 04:14:00"},"problem_types":["CWE-362"],"metrics":[],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-702/","name":"https://www.zerodayinitiative.com/advisories/ZDI-23-702/","refsource":"MISC","tags":[],"title":"ZDI-23-702 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/security/cve/CVE-2023-32254","name":"https://access.redhat.com/security/cve/CVE-2023-32254","refsource":"MISC","tags":[],"title":"cve-details","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2191658","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2191658","refsource":"MISC","tags":[],"title":"2191658 – (CVE-2023-32254, ZDI-23-702, ZDI-CAN-20592) CVE-2023-32254 kernel: ksmbd: tree connection race condition remote code execution vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20230824-0004/","name":"https://security.netapp.com/advisory/ntap-20230824-0004/","refsource":"MISC","tags":[],"title":"July 2023 Linux Kernel 6.4 Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-32254","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32254","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"32254","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-32254","qid":"199421","title":"Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6173-1)"},{"cve":"CVE-2023-32254","qid":"199652","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6283-1)"},{"cve":"CVE-2023-32254","qid":"200243","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6725-1)"},{"cve":"CVE-2023-32254","qid":"6000207","title":"Debian Security Update for linux (DSA 5448-1)"},{"cve":"CVE-2023-32254","qid":"907083","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (27402-1)"},{"cve":"CVE-2023-32254","qid":"907124","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (27400-1)"},{"cve":"CVE-2023-32254","qid":"907860","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for hyperv-daemons (27634-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-32254","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","cweId":"CWE-362"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"kernel","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"version":"6.4-rc1","status":"unaffected"}]}}]}}]}},{"vendor_name":"Red Hat","product":{"product_data":[{"product_name":"Red Hat Enterprise Linux 6","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}}]}},{"product_name":"Red Hat Enterprise Linux 7","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}},{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}}]}},{"product_name":"Red Hat Enterprise Linux 8","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}},{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}}]}},{"product_name":"Red Hat Enterprise Linux 9","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}},{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}}]}}]}},{"vendor_name":"Fedora","product":{"product_data":[{"product_name":"Fedora","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://access.redhat.com/security/cve/CVE-2023-32254","refsource":"MISC","name":"https://access.redhat.com/security/cve/CVE-2023-32254"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2191658","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2191658"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-702/","refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-23-702/"},{"url":"https://security.netapp.com/advisory/ntap-20230824-0004/","refsource":"MISC","name":"https://security.netapp.com/advisory/ntap-20230824-0004/"}]},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-10 16:15:00","lastModifiedDate":"2023-11-07 04:14:00","problem_types":["CWE-362"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}