CVE-2024-57925
ksmbd: fix a missing return value check bug
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix a missing return value check bug In the smb2_send_interim_resp(), if ksmbd_alloc_work_struct() fails to allocate a node, it returns a NULL pointer to the in_work pointer. This can lead to an illegal memory write of in_work->response_buf when allocate_interim_rsp_buf() attempts to perform a kzalloc() on it. To address this issue, incorporating a check for the return value of ksmbd_alloc_work_struct() ensures that the function returns immediately upon allocation failure, thereby preventing the aforementioned illegal memory access.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 19, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
6f0207218c4c125f5bf32055ac4220b4ef3b7e67 < 781c743e18bfd9b7dc0383f036ae952bd1486f21 f8cf1ebb7de62c7d807707ce4abb69d483629263 < ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce 041bba4414cda37d00063952c9bff9c3d5812a19 < 271ae0edbfc942795c162e6cf20d2bc02bd7fde4 041bba4414cda37d00063952c9bff9c3d5812a19 < 2976e91a3e569cf2c92c9f71512c0ab1312fe965 041bba4414cda37d00063952c9bff9c3d5812a19 < 4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c
Linux / Linux
6.6
References
git.kernel.org: https://git.kernel.org/stable/c/781c743e18bfd9b7dc0383f036ae952bd1486f21 git.kernel.org: https://git.kernel.org/stable/c/ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce git.kernel.org: https://git.kernel.org/stable/c/271ae0edbfc942795c162e6cf20d2bc02bd7fde4 git.kernel.org: https://git.kernel.org/stable/c/2976e91a3e569cf2c92c9f71512c0ab1312fe965 git.kernel.org: https://git.kernel.org/stable/c/4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html