First published: Fri Nov 15 2024(Updated: )
A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39179 has been classified as a critical severity vulnerability due to its potential to disclose sensitive information.
To fix CVE-2023-39179, update the Linux Kernel to the latest version where the vulnerability has been patched.
CVE-2023-39179 could allow an attacker to disclose sensitive data from a system affected by the flaw.
CVE-2023-39179 affects multiple versions of the Linux Kernel, particularly those utilizing the ksmbd module.
There is currently no public information indicating that CVE-2023-39179 is actively being exploited in the wild.