
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-39176) was discovered in the Linux kernel's ksmbd module, specifically within the parsing of SMB2 requests containing transform headers. The vulnerability was disclosed in June 2024 and affects Linux systems with the ksmbd module enabled. The flaw stems from inadequate validation of user-supplied data, which can lead to a read operation beyond an allocated buffer's boundaries (ZDI Advisory, Red Hat CVE).
The vulnerability is classified as an Out-of-bounds Read (CWE-125) with a CVSS v3.1 base score of 5.8 (Medium). The attack vector is network-based, requiring low attack complexity with no privileges or user interaction needed. The vulnerability specifically occurs during the processing of SMB2 requests with transform headers in the kernel's ksmbd module (ZDI Advisory, Red Hat CVE).
The vulnerability allows remote attackers to disclose sensitive information on affected Linux installations. The out-of-bounds read could potentially expose memory contents, which might include sensitive data such as cryptographic keys, PII, or memory addresses that could be leveraged in further attacks (ZDI Advisory).
Linux has issued an update to address this vulnerability. Red Hat products are not affected as the ksmbd code is not included in any shipping RHEL kernel release. For affected systems, applying the kernel update is recommended (Red Hat CVE, Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."