A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 18 Nov 2024 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability | Kernel: ksmbd: read request out-of-bounds read information disclosure vulnerability |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
|
Sat, 16 Nov 2024 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE. | |
Title | kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability | |
Weaknesses | CWE-125 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2024-11-18T15:08:52.852Z
Reserved: 2023-07-25T15:45:06.863Z
Link: CVE-2023-39179

Updated: 2024-11-18T15:08:47.853Z

Status : Awaiting Analysis
Published: 2024-11-18T10:15:04.980
Modified: 2024-11-18T17:11:17.393
Link: CVE-2023-39179
