CVE-2024-26828
Published: April 18, 2024Last modified: April 18, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 6.7 | 
| Attack Vector | ADJACENT_NETWORK | 
| Attack complexity | LOW | 
| Privileges required | LOW | 
| User interaction | REQUIRED | 
| Scope | UNCHANGED | 
| Confidentiality | NONE | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.81-r0) | 
| 25 LTS | linux-lts | Fixed (6.12.41-r0) | |
| Stream | linux-lts | Fixed (6.12.41-r0) |