CVE-2024-26952
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
01/05/2024
Last modified:
23/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: fix potencial out-of-bounds when buffer offset is invalid<br />
<br />
I found potencial out-of-bounds when buffer offset fields of a few requests<br />
is invalid. This patch set the minimum value of buffer offset field to<br />
->Buffer offset to validate buffer length.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.181 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.119 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.32 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.12 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5
- https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63
- https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e
- https://git.kernel.org/stable/c/480469f145e5abf83361e608734e421b7d99693d
- https://git.kernel.org/stable/c/ad6480c9a5d884e2704adc51d69895d93339176c
- https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da
- https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5
- https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63
- https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e
- https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da