A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
History

Mon, 18 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 Nov 2024 10:00:00 +0000

Type Values Removed Values Added
Title kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability Kernel: ksmbd: read request out-of-bounds read information disclosure vulnerability
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Sat, 16 Nov 2024 03:00:00 +0000

Type Values Removed Values Added
Description A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
Title kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability
Weaknesses CWE-125
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L'}

threat_severity

Low


cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published: 2024-11-18T09:51:09.580Z

Updated: 2024-11-18T15:08:52.852Z

Reserved: 2023-07-25T15:45:06.863Z

Link: CVE-2023-39179

cve-icon Vulnrichment

Updated: 2024-11-18T15:08:47.853Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-18T10:15:04.980

Modified: 2024-11-18T17:11:17.393

Link: CVE-2023-39179

cve-icon Redhat

Severity : Low

Publid Date: 2024-06-10T00:00:00Z

Links: CVE-2023-39179 - Bugzilla