CVE-2024-26828

Source
https://cve.org/CVERecord?id=CVE-2024-26828
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26828.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26828
Downstream
Related
Published
2024-04-17T09:43:52.995Z
Modified
2026-03-20T12:35:14.600148Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H CVSS Calculator
Summary
cifs: fix underflow in parse_server_interfaces()
Details

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix underflow in parseserverinterfaces()

In this loop, we step through the buffer and after each item we check if the sizeleft is greater than the minimum size we need. However, the problem is that "bytesleft" is type ssizet while sizeof() is type sizet. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26828.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fe856be475f7cf5ffcde57341d175ce9fd09434b
Fixed
7190353835b4a219abb70f90b06cdcae97f11512
Fixed
f7ff1c89fb6e9610d2b01c1821727729e6609308
Fixed
df2af9fdbc4ddde18a3371c4ca1a86596e8be301
Fixed
cffe487026be13eaf37ea28b783d9638ab147204

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26828.json"