First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: check outstanding simultaneous SMB operations If Client send simultaneous SMB operations to ksmbd, It exhausts too much memory through the "ksmbd_work_cache”. It will cause OOM issue. ksmbd has a credit mechanism but it can't handle this problem. This patch add the check if it exceeds max credits to prevent this problem by assuming that one smb request consumes at least one credit.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.61 | |
Linux Kernel | >=6.7<6.11.8 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 | |
debian/linux | <=6.1.123-1<=6.1.128-1 | 5.10.223-1 5.10.226-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50285 has a high severity rating due to its potential to cause out-of-memory (OOM) issues by exhausting memory with simultaneous SMB operations.
To fix CVE-2024-50285, update to the latest version of the Linux Kernel that addresses this vulnerability.
CVE-2024-50285 affects Linux Kernel versions up to 6.6.61, between 6.7 and 6.11.8, and specific release candidates from 6.12.
Systems running affected versions of the Linux Kernel with ksmbd enabled are at risk for CVE-2024-50285.
CVE-2024-50285 can lead to excessive memory consumption during simultaneous SMB operations, potentially resulting in service disruption.