Advisory Details March 1st, 2024 Linux Kernel ksmbd Chained Request Improper Input Validation Information Disclosure Vulnerability ZDI-24-227 ZDI-CAN-21506 CVE ID CVE-2023-52442 CVSS SCORE 9.3, AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L AFFECTED VENDORS Linux AFFECTED PRODUCTS Kernel This vulnerability allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. VULNERABILITY DETAILS The specific flaw exists within the handling of chained requests. The issue results from the lack of proper validation of user-supplied requests prior to processing them. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. ADDITIONAL DETAILS Linux has issued an update to correct this vulnerability. More details can be found at: https://github.com/torvalds/linux/commit/3df0411e132ee74a87aa13142dfd2b190275332e DISCLOSURE TIMELINE • 2023-07-18 - Vulnerability reported to vendor • 2024-03-01 - Coordinated public release of advisory CREDIT HexRabbit (@h3xr4bb1t)