U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-49996

Change History

New CVE Received by NIST 10/21/2024 2:15:19 PM

Action Type Old Value New Value
Added Description

								
							
							
						
In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix buffer overflow when parsing NFS reparse points

ReparseDataLength is sum of the InodeType size and DataBuffer size.
So to get DataBuffer size it is needed to subtract InodeType's size from
ReparseDataLength.

Function cifs_strndup_from_utf16() is currentlly accessing buf->DataBuffer
at position after the end of the buffer because it does not subtract
InodeType size from the length. Fix this problem and correctly subtract
variable len.

Member InodeType is present only when reparse buffer is large enough. Check
for ReparseDataLength before accessing InodeType to prevent another invalid
memory access.

Major and minor rdev values are present also only when reparse buffer is
large enough. Check for reparse buffer size before calling reparse_mkdev().
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/803b3a39cb096d8718c0aebc03fd19f11c7dc919 [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/c173d47b69f07cd7ca08efb4e458adbd4725d8e9 [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/c6db81c550cea0c73bd72ef55f579991e0e4ba07 [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/e2a8910af01653c1c268984855629d71fb81f404 [No types assigned]