Release Date: | 2024-11-07 |
In the Linux kernel, the following vulnerability has been resolved:\nsmb: client: fix OOBs when building SMB2_IOCTL request\nWhen using encryption, either enforced by the server or when using\n'seal' mount option, the client will squash all compound request buffers\ndown for encryption into a single iov in smb2_set_next_command().\nSMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the\nSMB2_IOCTL request in the first iov, and if the user passes an input\nbuffer that is greater than 328 bytes, smb2_set_next_command() will\nend up writing off the end of @rqst->iov[0].iov_base as shown below:\nmount.cifs //srv/share /mnt -o ...,seal\nln -s /mnt/link\nBUG: KASAN: slab-out-of-bounds in\nsmb2_set_next_command.cold+0x1d6/0x24c [cifs]\nWrite of size 4116 at addr ffff8881148fcab8 by task ln/859\nCPU: 1 UID: 0 PID: 859 Comm: ln Not tainted 6.12.0-rc3 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n1.16.3-2.fc40 04/01/2014\nCall Trace:\n
See more information about CVE-2024-50151 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 7.8 |
Vector String: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Version: | 3.1 |
Attack Vector: | Local |
Attack Complexity: | Low |
Privileges Required: | Low |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality: | High |
Integrity: | High |
Availability: | High |
Platform | Errata | Release Date |
Oracle Linux version 7 (kernel-uek) | ELSA-2024-12884 | 2024-12-16 |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12884 | 2024-12-16 |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12887 | 2024-12-18 |
Oracle Linux version 9 (kernel-uek) | ELSA-2024-12887 | 2024-12-18 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: