In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()
If ->NameOffset of smb2_create_req is smaller than Buffer offset of
smb2_create_req, slab-out-of-bounds read can happen from smb2_open.
This patch set the minimum value of the name offset to the buffer offset
to validate name length of smb2_create_req().
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 | Mailing List Patch |
https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 | Mailing List Patch |
https://git.kernel.org/stable/c/9e4937cbc150f9d5a9b5576e1922ef0b5ed2eb72 | |
https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa | Mailing List Patch |
https://git.kernel.org/stable/c/d70c2e0904ab3715c5673fd45788a464a246d1db | Mailing List Patch |
https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 | Mailing List Patch |
https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 | Mailing List Patch |
https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
11 Sep 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/d70c2e0904ab3715c5673fd45788a464a246d1db - Mailing List, Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
02 Dec 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 - | |
References | () https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 - | |
References | () https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa - |
01 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 06:15
Updated : 2025-09-11 13:15
NVD link : CVE-2024-26954
Mitre link : CVE-2024-26954
CVE.ORG link : CVE-2024-26954
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read