We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-26936

ksmbd: validate request buffer size in smb2_allocate_rsp_buf()



Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate request buffer size in smb2_allocate_rsp_buf() The response buffer should be allocated in smb2_allocate_rsp_buf before validating request. But the fields in payload as well as smb2 header is used in smb2_allocate_rsp_buf(). This patch add simple buffer size validation to avoid potencial out-of-bounds in request buffer.

Reserved 2024-02-19 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

0626e6641f6b467447c81dd7678a69c66f7746cf before 8f3d0bf1d0c62b539d54c5b9108a845cff619b99
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before 21ff9d7d223c5c19cb4334009e4c0c83a2f4d674
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before 5c20b242d4fed73a93591e48bfd9772e2322fb11
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before 2c27a64a2bc47d9bfc7c3cf8be14be53b1ee7cb6
affected

0626e6641f6b467447c81dd7678a69c66f7746cf before 17cf0c2794bdb6f39671265aa18aea5c22ee8c4a
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

5.15.159
unaffected

6.1.88
unaffected

6.6.29
unaffected

6.8.8
unaffected

6.9
unaffected

References

git.kernel.org/...c/8f3d0bf1d0c62b539d54c5b9108a845cff619b99

git.kernel.org/...c/21ff9d7d223c5c19cb4334009e4c0c83a2f4d674

git.kernel.org/...c/5c20b242d4fed73a93591e48bfd9772e2322fb11

git.kernel.org/...c/2c27a64a2bc47d9bfc7c3cf8be14be53b1ee7cb6

git.kernel.org/...c/17cf0c2794bdb6f39671265aa18aea5c22ee8c4a

cve.org (CVE-2024-26936)

nvd.nist.gov (CVE-2024-26936)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26936

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.