CVE-2024-26936

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26936
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26936.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26936
Downstream
Related
Published
2024-05-01T06:15:08Z
Modified
2025-09-18T14:19:00Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate request buffer size in smb2allocatersp_buf()

The response buffer should be allocated in smb2allocaterspbuf before validating request. But the fields in payload as well as smb2 header is used in smb2allocaterspbuf(). This patch add simple buffer size validation to avoid potencial out-of-bounds in request buffer.

References

Affected packages