A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-39180 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2326531 | Issue Tracking Third Party Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-24-589/ | Third Party Advisory |
Configurations
History
06 Aug 2025, 13:34
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
| References | () https://access.redhat.com/security/cve/CVE-2023-39180 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2326531 - Issue Tracking, Third Party Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-24-589/ - Third Party Advisory |
Information
Published : 2024-11-18 10:15
Updated : 2025-08-06 13:34
NVD link : CVE-2023-39180
Mitre link : CVE-2023-39180
CVE.ORG link : CVE-2023-39180
JSON object : View
Products Affected
linux
- linux_kernel
