SB20240620114 - Memory corruption in Linux kernel ksmbd
Published: June 20, 2024 Updated: September 19, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2023-52440)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to memory corruption error within the ksmbd_decode_ntlmssp_auth_blob() function in fs/ksmbd/auth.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809
- https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba
- https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4
- https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20
- https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.145
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.52
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.15
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6