A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-39180 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2326531 | Issue Tracking Third Party Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-24-589/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-11-18 10:15
Updated : 2025-08-06 13:34
NVD link : CVE-2023-39180
Mitre link : CVE-2023-39180
CVE.ORG link : CVE-2023-39180
JSON object : View
Products Affected
linux
- linux_kernel
