PT-2023-8716 · Linux +3 · Linux Kernel +3

Published

2023-08-29

·

Updated

2025-09-16

·

CVE-2023-52440

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:**

Linux Kernel (affected versions not specified)

kernel-image-rpi-un version 6.1.77-alt1

**Description:**

The Linux Kernel contains a heap-based buffer overflow in the ksmbd module, specifically within the `ksmbd decode ntlmssp auth blob()` function. This occurs when the `authblob->SessionKey.Length` value exceeds the expected session key size (`CIFS KEY SIZE`), leading to a slub overflow during key exchange code processing. The `cifs arc4 crypt` function copies data from the client's `SessionKey` into a session key array. This vulnerability could allow a remote attacker to execute arbitrary code.

**Recommendations:**

Update kernel-image-rpi-un to version 6.1.77-alt1.

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Buffer Overflow

Integer Overflow

Weakness Enumeration

Related Identifiers

ALT-PU-2024-4843
BDU:2024-01670
CVE-2023-52440
ZDI-24-229

Affected Products

Alt Linux
Astra Linux
Linux Kernel
Red Os