Bug 1211533 (CVE-2023-32251) - VUL-0: CVE-2023-32251: kernel: Linux Kernel ksmbd Improper Restriction of Excessive Authentication Attempts Protection Bypass Vulnerability
Summary: VUL-0: CVE-2023-32251: kernel: Linux Kernel ksmbd Improper Restriction of Exc...
Status: RESOLVED UPSTREAM
Alias: CVE-2023-32251
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Current
Hardware: Other Other
: P3 - Medium : Minor (vote)
Target Milestone: ---
Assignee: Security Team bot
QA Contact: E-mail List
URL: https://smash.suse.de/issue/366971/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-05-19 07:34 UTC by Stoyan Manolov
Modified: 2023-05-25 06:25 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stoyan Manolov 2023-05-19 07:34:43 UTC
CVE-2023-32251

This vulnerability allows remote attackers to create a brute force condition on
affected installations of Linux Kernel. Authentication is not required to
exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

The specific flaw exists within the handling of asynchronous connections. The
issue results from the lack of protection of an authentication mechanism. An
attacker can leverage this vulnerability to brute force the credentials on the
system.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32251
https://www.zerodayinitiative.com/advisories/ZDI-23-699/
Comment 2 Michal Koutný 2023-05-22 16:29:59 UTC
https://github.com/torvalds/linux/commit/b096d97f47326b1e2dbdef1c91fab69ffda54d17

Possibly needed in the `stable` branch before v6.4 is out.