CVE-2024-26811

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate payload size in ipc response If installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc response to ksmbd kernel server. ksmbd should validate payload size of ipc response from ksmbd.mountd to avoid memory overrun or slab-out-of-bounds. This patch validate 3 ipc response that has payload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

04 Nov 2025, 22:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/6XCNJZBDMGJXRIKLGKM4RRJU4XCHPX62/ -
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/LG6L4FXO4WNWUM6W7USOH2YTRVWREM3V/ -
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/RO3RO34MLQ6WT3A7O6STQUVXW43N6W3K/ -

Information

Published : 2024-04-08 10:15

Updated : 2025-11-04 22:15


NVD link : CVE-2024-26811

Mitre link : CVE-2024-26811

CVE.ORG link : CVE-2024-26811


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write