CVE-2024-26952

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potencial out-of-bounds when buffer offset fields of a few requests is invalid. This patch set the minimum value of buffer offset field to ->Buffer offset to validate buffer length.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 May 2025, 20:49

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e - () https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e - Patch
References () https://git.kernel.org/stable/c/480469f145e5abf83361e608734e421b7d99693d - () https://git.kernel.org/stable/c/480469f145e5abf83361e608734e421b7d99693d - Patch
References () https://git.kernel.org/stable/c/ad6480c9a5d884e2704adc51d69895d93339176c - () https://git.kernel.org/stable/c/ad6480c9a5d884e2704adc51d69895d93339176c - Patch

02 May 2025, 07:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/480469f145e5abf83361e608734e421b7d99693d -

02 Dec 2024, 08:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/ad6480c9a5d884e2704adc51d69895d93339176c -

25 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e -

23 May 2024, 19:14

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-120
References () https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63 - () https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63 - Patch
References () https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5 - () https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5 - Patch
References () https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da - () https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da - Patch

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2025-05-23 20:49


NVD link : CVE-2024-26952

Mitre link : CVE-2024-26952


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')