Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: check outstanding simultaneous SMB operations If Client send simultaneous SMB operations to ksmbd, It exhausts too much memory through the "ksmbd_work_cache”. It will cause OOM issue. ksmbd has a credit mechanism but it can't handle this problem. This patch add the check if it exceeds max credits to prevent this problem by assuming that one smb request consumes at least one credit.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.6.61 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0a77d947f599b1f39065015bec99390d0c0022eePatch
- https://git.kernel.org/stable/c/1f993777275cbd8f74765c4f9d9285cb907c9be5Patch
- https://git.kernel.org/stable/c/e257ac6fe138623cf59fca8898abdf659dbc8356Patch
FAQ
What is CVE-2024-50285?
CVE-2024-50285 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ksmbd: check outstanding simultaneous SMB operations If Client send simultaneous SMB operations to ksmbd, It exhausts too much mem...
How severe is CVE-2024-50285?
CVE-2024-50285 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50285?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.