{"id":"CVE-2023-32255","details":"A flaw was found in the Linux kernel's ksmbd component. A memory leak can occur if a client sends a session setup request with an unknown NTLMSSP message type,  potentially leading to resource exhaustion.","modified":"2026-03-15T14:11:30.084113Z","published":"2025-08-02T23:15:25.820Z","references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2023-32255"},{"type":"WEB","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d7cb549c2ca20e1f07593f15e936fd54b763028"},{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-23-703/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2385884"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"6d7cb549c2ca20e1f07593f15e936fd54b763028"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32255.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}