In the Linux kernel, the following vulnerability has been resolved:
smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req()
This happens when called from SMB2_read() while using rdma
and reaching the rdma_readwrite_threshold.
References
Configurations
Configuration 1 (hide)
|
History
14 Sep 2024, 16:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.2.3:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/6df57c63c200cd05e085c3b695128260e21959b7 - Patch | |
References | () https://git.kernel.org/stable/c/a01859dd6aebf826576513850a3b05992809e9d2 - Patch | |
References | () https://git.kernel.org/stable/c/b902fb78ab21299e4dd1775e7e8d251d5c0735bc - Patch | |
References | () https://git.kernel.org/stable/c/c724b2ab6a46435b4e7d58ad2fbbdb7a318823cf - Patch |
13 Sep 2024, 14:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-13 06:15
Updated : 2024-09-14 16:16
NVD link : CVE-2024-46686
Mitre link : CVE-2024-46686
CVE.ORG link : CVE-2024-46686
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference