Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36512 | A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion. |
Mon, 04 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 02 Aug 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type, potentially leading to resource exhaustion. | |
| Title | Kernel: memory leak via ksmbd session setup request with unknown ntlmssp message type | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-772 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T17:27:46.670Z
Reserved: 2023-05-05T10:00:07.896Z
Link: CVE-2023-32255
Updated: 2025-08-04T13:21:04.042Z
Status : Deferred
Published: 2025-08-02T23:15:25.820
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-32255
No data.
OpenCVE Enrichment
No data.
EUVD