First published: Fri Sep 13 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() This happens when called from SMB2_read() while using rdma and reaching the rdma_readwrite_threshold.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.1.16<6.1.108 | |
Linux Kernel | >=6.3<6.6.49 | |
Linux Kernel | >=6.7<6.10.8 | |
Linux Kernel | =6.2.3 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 | |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46686 is classified with a high severity due to its potential impact on system stability and data integrity.
To mitigate CVE-2024-46686, update the Linux kernel to a version that includes the fix, such as 5.10.223-1 or later.
CVE-2024-46686 affects specific versions of the Linux kernel between 6.1.16 and 6.1.108, as well as versions 6.3 to 6.6.49.
While the exact exploitation vectors are not detailed, vulnerabilities in the kernel generally pose risks that could be exploited remotely under certain conditions.
CVE-2024-46686 impacts systems running specific versions of the Linux kernel, particularly those using SMB2 with RDMA support.