In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix a missing return value check bug
In the smb2sendinterimresp(), if ksmbdallocworkstruct() fails to allocate a node, it returns a NULL pointer to the inwork pointer. This can lead to an illegal memory write of inwork->responsebuf when allocateinterimrspbuf() attempts to perform a kzalloc() on it.
To address this issue, incorporating a check for the return value of ksmbdallocwork_struct() ensures that the function returns immediately upon allocation failure, thereby preventing the aforementioned illegal memory access.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57925.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57925.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce",
"digest": {
"line_hashes": [
"322219724825492514440833155761764626722",
"138873055471304484031504046520629104175",
"5406981604813000191885055223271994209"
],
"threshold": 0.9
},
"id": "CVE-2024-57925-04891159",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@271ae0edbfc942795c162e6cf20d2bc02bd7fde4",
"digest": {
"function_hash": "122922928430209374732430740893123511020",
"length": 547.0
},
"id": "CVE-2024-57925-0a4c2501",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_send_interim_resp"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@781c743e18bfd9b7dc0383f036ae952bd1486f21",
"digest": {
"line_hashes": [
"322219724825492514440833155761764626722",
"138873055471304484031504046520629104175",
"5406981604813000191885055223271994209"
],
"threshold": 0.9
},
"id": "CVE-2024-57925-3cf264d5",
"deprecated": false,
"target": {
"file": "fs/ksmbd/smb2pdu.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c",
"digest": {
"line_hashes": [
"322219724825492514440833155761764626722",
"138873055471304484031504046520629104175",
"5406981604813000191885055223271994209"
],
"threshold": 0.9
},
"id": "CVE-2024-57925-7b82a9b5",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2976e91a3e569cf2c92c9f71512c0ab1312fe965",
"digest": {
"function_hash": "122922928430209374732430740893123511020",
"length": 547.0
},
"id": "CVE-2024-57925-8c98ac46",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_send_interim_resp"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce",
"digest": {
"function_hash": "122922928430209374732430740893123511020",
"length": 547.0
},
"id": "CVE-2024-57925-9d40edbb",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_send_interim_resp"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2976e91a3e569cf2c92c9f71512c0ab1312fe965",
"digest": {
"line_hashes": [
"322219724825492514440833155761764626722",
"138873055471304484031504046520629104175",
"5406981604813000191885055223271994209"
],
"threshold": 0.9
},
"id": "CVE-2024-57925-a91c8ea7",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c",
"digest": {
"function_hash": "122922928430209374732430740893123511020",
"length": 547.0
},
"id": "CVE-2024-57925-e05ee97d",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c",
"function": "smb2_send_interim_resp"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@781c743e18bfd9b7dc0383f036ae952bd1486f21",
"digest": {
"function_hash": "122922928430209374732430740893123511020",
"length": 547.0
},
"id": "CVE-2024-57925-fdc1a649",
"deprecated": false,
"target": {
"file": "fs/ksmbd/smb2pdu.c",
"function": "smb2_send_interim_resp"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@271ae0edbfc942795c162e6cf20d2bc02bd7fde4",
"digest": {
"line_hashes": [
"322219724825492514440833155761764626722",
"138873055471304484031504046520629104175",
"5406981604813000191885055223271994209"
],
"threshold": 0.9
},
"id": "CVE-2024-57925-ff05179d",
"deprecated": false,
"target": {
"file": "fs/smb/server/smb2pdu.c"
}
}
]