In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate request buffer size in smb2_allocate_rsp_buf()
The response buffer should be allocated in smb2_allocate_rsp_buf
before validating request. But the fields in payload as well as smb2 header
is used in smb2_allocate_rsp_buf(). This patch add simple buffer size
validation to avoid potencial out-of-bounds in request buffer.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-01 06:15
Updated : 2025-09-18 14:19
NVD link : CVE-2024-26936
Mitre link : CVE-2024-26936
CVE.ORG link : CVE-2024-26936
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
