In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate payload size in ipc response
If installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc
response to ksmbd kernel server. ksmbd should validate payload size of
ipc response from ksmbd.mountd to avoid memory overrun or
slab-out-of-bounds. This patch validate 3 ipc response that has payload.
References
Configurations
Configuration 1 (hide)
|
History
27 Mar 2025, 21:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-787 | |
References | () https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd - Patch | |
References | () https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896 - Patch | |
References | () https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300 - Patch | |
References | () https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c - Patch | |
References | () https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac - Patch |
Information
Published : 2024-04-08 10:15
Updated : 2025-03-27 21:37
NVD link : CVE-2024-26811
Mitre link : CVE-2024-26811
CVE.ORG link : CVE-2024-26811
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write