
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel's ksmbd module (CVE-2023-39180) affecting the handling of SMB2_READ commands. The flaw stems from improper memory management where memory is not released after its effective lifetime. The vulnerability was disclosed and documented in November 2024, affecting Linux systems with the ksmbd module enabled (NVD, Red Hat).
The vulnerability exists specifically within the handling of SMB2_READ commands in the kernel ksmbd module. The technical issue involves a memory leak caused by not properly releasing memory after its effective lifetime. The vulnerability has been assigned a CVSS v3.1 base score of 4.0 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption) (NVD, ZDI).
The vulnerability can be exploited to create a denial-of-service condition on affected Linux installations. While authentication is not required to exploit this vulnerability, only systems with the ksmbd module enabled are vulnerable to this attack (ZDI, Red Hat).
Linux has issued an update to correct this vulnerability. The fix was submitted via a kernel patch. For systems that cannot immediately apply the patch, the primary mitigation is to ensure the ksmbd module is not enabled if not required (ZDI).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."