Executive Summary

Informations
Name CVE-2024-46795 First vendor Publication 2024-09-18
Vendor Cve Last vendor Modification 2024-09-20

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: unset the binding mark of a reused connection

Steve French reported null pointer dereference error from sha256 lib. cifs.ko can send session setup requests on reused connection. If reused connection is used for binding session, conn->binding can still remain true and generate_preauth_hash() will not set sess->Preauth_HashValue and it will be NULL. It is used as a material to create an encryption key in ksmbd_gen_smb311_encryptionkey. ->Preauth_HashValue cause null pointer dereference error from crypto_shash_update().

BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 8 PID: 429254 Comm: kworker/8:39 Hardware name: LENOVO 20MAS08500/20MAS08500, BIOS N2CET69W (1.52 ) Workqueue: ksmbd-io handle_ksmbd_work [ksmbd] RIP: 0010:lib_sha256_base_do_update.isra.0+0x11e/0x1d0 [sha256_ssse3] ? show_regs+0x6d/0x80 ? __die+0x24/0x80 ? page_fault_oops+0x99/0x1b0 ? do_user_addr_fault+0x2ee/0x6b0 ? exc_page_fault+0x83/0x1b0 ? asm_exc_page_fault+0x27/0x30 ? __pfx_sha256_transform_rorx+0x10/0x10 [sha256_ssse3] ? lib_sha256_base_do_update.isra.0+0x11e/0x1d0 [sha256_ssse3] ? __pfx_sha256_transform_rorx+0x10/0x10 [sha256_ssse3] ? __pfx_sha256_transform_rorx+0x10/0x10 [sha256_ssse3] _sha256_update+0x77/0xa0 [sha256_ssse3] sha256_avx2_update+0x15/0x30 [sha256_ssse3] crypto_shash_update+0x1e/0x40 hmac_update+0x12/0x20 crypto_shash_update+0x1e/0x40 generate_key+0x234/0x380 [ksmbd] generate_smb3encryptionkey+0x40/0x1c0 [ksmbd] ksmbd_gen_smb311_encryptionkey+0x72/0xa0 [ksmbd] ntlm_authenticate.isra.0+0x423/0x5d0 [ksmbd] smb2_sess_setup+0x952/0xaa0 [ksmbd] __process_request+0xa3/0x1d0 [ksmbd] __handle_ksmbd_work+0x1c4/0x2f0 [ksmbd] handle_ksmbd_work+0x2d/0xa0 [ksmbd] process_one_work+0x16c/0x350 worker_thread+0x306/0x440 ? __pfx_worker_thread+0x10/0x10 kthread+0xef/0x120 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x44/0x70 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3676

Sources (Detail)

https://git.kernel.org/stable/c/41bc256da7e47b679df87c7fc7a5b393052b9cce
https://git.kernel.org/stable/c/4c8496f44f5bb5c06cdef5eb130ab259643392a1
https://git.kernel.org/stable/c/78c5a6f1f630172b19af4912e755e1da93ef0ab5
https://git.kernel.org/stable/c/93d54a4b59c4b3d803d20aa645ab5ca71f3b3b02
https://git.kernel.org/stable/c/9914f1bd61d5e838bb1ab15a71076d37a6db65d1
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Date Informations
2025-03-29 03:40:40
  • Multiple Updates
2025-03-28 13:45:04
  • Multiple Updates
2025-03-28 03:18:45
  • Multiple Updates
2025-03-19 03:14:05
  • Multiple Updates
2025-03-18 03:27:01
  • Multiple Updates
2025-03-14 03:14:18
  • Multiple Updates
2025-03-06 14:10:50
  • Multiple Updates
2025-02-22 03:24:24
  • Multiple Updates
2025-01-08 03:05:24
  • Multiple Updates
2025-01-07 03:04:57
  • Multiple Updates
2024-12-25 03:03:35
  • Multiple Updates
2024-12-12 03:06:32
  • Multiple Updates
2024-11-23 03:03:29
  • Multiple Updates
2024-11-22 03:01:38
  • Multiple Updates
2024-11-20 02:59:58
  • Multiple Updates
2024-11-14 03:00:17
  • Multiple Updates
2024-11-09 03:00:17
  • Multiple Updates
2024-10-26 02:57:39
  • Multiple Updates
2024-10-25 02:59:32
  • Multiple Updates
2024-10-23 02:58:43
  • Multiple Updates
2024-10-03 02:53:52
  • Multiple Updates
2024-10-02 02:52:14
  • Multiple Updates
2024-09-21 05:27:33
  • Multiple Updates
2024-09-20 17:27:28
  • Multiple Updates
2024-09-18 13:27:29
  • First insertion