CVE-2024-26954
ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()
Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() If ->NameOffset of smb2_create_req is smaller than Buffer offset of smb2_create_req, slab-out-of-bounds read can happen from smb2_open. This patch set the minimum value of the name offset to the buffer offset to validate name length of smb2_create_req().
INFO
Published Date :
May 1, 2024, 6:15 a.m.
Last Modified :
Sept. 11, 2025, 1:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | HIGH | [email protected] |
Solution
- Update the affected kernel package.
- Upgrade the linux-config packages.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-26954
.
URL | Resource |
---|---|
https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 | Mailing List Patch |
https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 | Mailing List Patch |
https://git.kernel.org/stable/c/9e4937cbc150f9d5a9b5576e1922ef0b5ed2eb72 | |
https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa | Mailing List Patch |
https://git.kernel.org/stable/c/d70c2e0904ab3715c5673fd45788a464a246d1db | Mailing List Patch |
https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 | Mailing List Patch |
https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 | Mailing List Patch |
https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa | Mailing List Patch |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-26954
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-26954
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-26954
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-26954
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 11, 2025
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/9e4937cbc150f9d5a9b5576e1922ef0b5ed2eb72 -
Initial Analysis by [email protected]
Mar. 04, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Added CWE CWE-125 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.8 from (excluding) 6.8.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.15 from (excluding) 6.1.119 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.7.12 Added Reference Type kernel.org: https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 Types: Mailing List, Patch Added Reference Type CVE: https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 Types: Mailing List, Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 Types: Mailing List, Patch Added Reference Type CVE: https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 Types: Mailing List, Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa Types: Mailing List, Patch Added Reference Type CVE: https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa Types: Mailing List, Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d70c2e0904ab3715c5673fd45788a464a246d1db Types: Mailing List, Patch -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Dec. 02, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/d70c2e0904ab3715c5673fd45788a464a246d1db -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 Added Reference https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 Added Reference https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 29, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 01, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() If ->NameOffset of smb2_create_req is smaller than Buffer offset of smb2_create_req, slab-out-of-bounds read can happen from smb2_open. This patch set the minimum value of the name offset to the buffer offset to validate name length of smb2_create_req(). Added Reference kernel.org https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa [No types assigned]