First published: Fri Nov 15 2024(Updated: )
A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39180 has been classified as a high-severity vulnerability due to its potential to cause a denial-of-service condition.
To fix CVE-2023-39180, update your Linux kernel to a version that addresses this specific flaw in the ksmbd module.
CVE-2023-39180 affects installations of the Linux kernel that utilize the ksmbd module.
CVE-2023-39180 can be exploited to create a denial-of-service condition on the affected systems.
No, CVE-2023-39180 can be exploited without authentication, making it particularly dangerous.