In the Linux kernel, the following vulnerability has been resolved:
smb/client: avoid dereferencing rdata=NULL in smb2newread_req()
This happens when called from SMB2read() while using rdma and reaching the rdmareadwrite_threshold.
[
{
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-28a8deb3",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6df57c63c200cd05e085c3b695128260e21959b7",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"185388744997776408851956012251865873817",
"135798976873419852539902132283011191958",
"203353175828969410774560080332145202128",
"297243853873630556643295202091382037754"
]
},
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "smb2_new_read_req",
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-64a2ae37",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b902fb78ab21299e4dd1775e7e8d251d5c0735bc",
"signature_version": "v1",
"digest": {
"function_hash": "100482381108831397708973059433518256438",
"length": 2349.0
},
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-bbbc0747",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b902fb78ab21299e4dd1775e7e8d251d5c0735bc",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"185388744997776408851956012251865873817",
"135798976873419852539902132283011191958",
"203353175828969410774560080332145202128",
"16326703818494075369947121950780190294"
]
},
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-befa00b0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a01859dd6aebf826576513850a3b05992809e9d2",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"185388744997776408851956012251865873817",
"135798976873419852539902132283011191958",
"203353175828969410774560080332145202128",
"158179654370868253362011062571839151713"
]
},
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "smb2_new_read_req",
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-da8cf99e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c724b2ab6a46435b4e7d58ad2fbbdb7a318823cf",
"signature_version": "v1",
"digest": {
"function_hash": "100482381108831397708973059433518256438",
"length": 2349.0
},
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "smb2_new_read_req",
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-ec1fb429",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a01859dd6aebf826576513850a3b05992809e9d2",
"signature_version": "v1",
"digest": {
"function_hash": "102994644991981265493662883541807833192",
"length": 2230.0
},
"deprecated": false
},
{
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-f3b52a2e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c724b2ab6a46435b4e7d58ad2fbbdb7a318823cf",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"185388744997776408851956012251865873817",
"135798976873419852539902132283011191958",
"203353175828969410774560080332145202128",
"16326703818494075369947121950780190294"
]
},
"deprecated": false
},
{
"signature_type": "Function",
"target": {
"function": "smb2_new_read_req",
"file": "fs/smb/client/smb2pdu.c"
},
"id": "CVE-2024-46686-fedc3e2b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6df57c63c200cd05e085c3b695128260e21959b7",
"signature_version": "v1",
"digest": {
"function_hash": "132094640713270067090604921807977911016",
"length": 2290.0
},
"deprecated": false
}
]