A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-39179 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2326529 | Issue Tracking Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-586/ | Not Applicable |
Configurations
History
06 Aug 2025, 13:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
References | () https://access.redhat.com/security/cve/CVE-2023-39179 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2326529 - Issue Tracking, Third Party Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-586/ - Not Applicable | |
First Time |
Linux
Linux linux Kernel |
18 Nov 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-18 10:15
Updated : 2025-08-06 13:21
NVD link : CVE-2023-39179
Mitre link : CVE-2023-39179
CVE.ORG link : CVE-2023-39179
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read