In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate payload size in ipc response
If installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc response to ksmbd kernel server. ksmbd should validate payload size of ipc response from ksmbd.mountd to avoid memory overrun or slab-out-of-bounds. This patch validate 3 ipc response that has payload.
[
{
"id": "CVE-2024-26811-05cee5cc",
"signature_version": "v1",
"digest": {
"length": 1788.0,
"function_hash": "246611618478155897205051553898405311301"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a677ebd8ca2f2632ccdecbad7b87641274e15aac",
"target": {
"file": "fs/smb/server/mgmt/share_config.c",
"function": "share_config_request"
}
},
{
"id": "CVE-2024-26811-26ac8e1f",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"244625803570367558373072335254940995808",
"277842254308658267667482297146843758399",
"333130857611691896191982162196718750197",
"18480821472631567648027942180675789610",
"46129976899755702358984268191631254047",
"217900210672844464657320267223798011389",
"158513511586897271163260741496000594927",
"337231024548950079396576481752227376327",
"118765164267048846104531118822021209183",
"155531566410928152591413716174104333593",
"6767275117398538021322497064504119073",
"12451005480390118018548155953498874538",
"111526588661756291921344645652920451156",
"51417053768288194779721102102013736728",
"17161267900228918996263269930833310607"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a677ebd8ca2f2632ccdecbad7b87641274e15aac",
"target": {
"file": "fs/smb/server/transport_ipc.c"
}
},
{
"id": "CVE-2024-26811-a662782a",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"60171967568202088979183659326108897835",
"304638336325208610505279394516282522771",
"20024411550026699470194089352243676218",
"14025793138563275789458517033069258883"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a677ebd8ca2f2632ccdecbad7b87641274e15aac",
"target": {
"file": "fs/smb/server/ksmbd_netlink.h"
}
},
{
"id": "CVE-2024-26811-efbfd5e0",
"signature_version": "v1",
"digest": {
"length": 643.0,
"function_hash": "175327262675171358434349699394629419198"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a677ebd8ca2f2632ccdecbad7b87641274e15aac",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "ipc_msg_send_request"
}
},
{
"id": "CVE-2024-26811-efe3d8e4",
"signature_version": "v1",
"digest": {
"length": 713.0,
"function_hash": "284489075571333709635840878561088885838"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a677ebd8ca2f2632ccdecbad7b87641274e15aac",
"target": {
"file": "fs/smb/server/transport_ipc.c",
"function": "handle_response"
}
},
{
"id": "CVE-2024-26811-f6b4e8b7",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"160439146256148014774627451003568562168",
"4799773111573394985550617367607394653",
"4468041300066797673729032995308599101",
"101182376019647492569653479481107569713"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a677ebd8ca2f2632ccdecbad7b87641274e15aac",
"target": {
"file": "fs/smb/server/mgmt/share_config.c"
}
}
]