๐Ÿ” CVE Alert

CVE-2024-57925

HIGH 7.1

ksmbd: fix a missing return value check bug

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix a missing return value check bug In the smb2_send_interim_resp(), if ksmbd_alloc_work_struct() fails to allocate a node, it returns a NULL pointer to the in_work pointer. This can lead to an illegal memory write of in_work->response_buf when allocate_interim_rsp_buf() attempts to perform a kzalloc() on it. To address this issue, incorporating a check for the return value of ksmbd_alloc_work_struct() ensures that the function returns immediately upon allocation failure, thereby preventing the aforementioned illegal memory access.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6f0207218c4c125f5bf32055ac4220b4ef3b7e67 < 781c743e18bfd9b7dc0383f036ae952bd1486f21 f8cf1ebb7de62c7d807707ce4abb69d483629263 < ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce 041bba4414cda37d00063952c9bff9c3d5812a19 < 271ae0edbfc942795c162e6cf20d2bc02bd7fde4 041bba4414cda37d00063952c9bff9c3d5812a19 < 2976e91a3e569cf2c92c9f71512c0ab1312fe965 041bba4414cda37d00063952c9bff9c3d5812a19 < 4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/781c743e18bfd9b7dc0383f036ae952bd1486f21 git.kernel.org: https://git.kernel.org/stable/c/ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce git.kernel.org: https://git.kernel.org/stable/c/271ae0edbfc942795c162e6cf20d2bc02bd7fde4 git.kernel.org: https://git.kernel.org/stable/c/2976e91a3e569cf2c92c9f71512c0ab1312fe965 git.kernel.org: https://git.kernel.org/stable/c/4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html