CVE-2024-26811

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate payload size in ipc response If installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc response to ksmbd kernel server. ksmbd should validate payload size of ipc response from ksmbd.mountd to avoid memory overrun or slab-out-of-bounds. This patch validate 3 ipc response that has payload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

27 Mar 2025, 21:37

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-787
References () https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd - () https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd - Patch
References () https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896 - () https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896 - Patch
References () https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300 - () https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300 - Patch
References () https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c - () https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c - Patch
References () https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac - () https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac - Patch

Information

Published : 2024-04-08 10:15

Updated : 2025-03-27 21:37


NVD link : CVE-2024-26811

Mitre link : CVE-2024-26811

CVE.ORG link : CVE-2024-26811


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write