Advisory Details

December 20th, 2024

Linux Kernel ksmbd TCP Connection Memory Exhaustion Denial-of-Service Vulnerability

ZDI-24-1726
ZDI-CAN-25738

CVE ID CVE-2024-50285
CVSS SCORE 5.9, AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
AFFECTED VENDORS Linux
AFFECTED PRODUCTS Kernel
VULNERABILITY DETAILS

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of the Linux Kernel. Authentication is not required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable.

The specific flaw exists within the handling of new TCP connections. The issue results from the lack of memory release after its effective lifetime. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

ADDITIONAL DETAILS Linux has issued an update to correct this vulnerability. More details can be found at:
https://lore.kernel.org/linux-cve-announce/2024111946-CVE-2024-50285-6013@gregkh/
DISCLOSURE TIMELINE
  • 2024-12-02 - Vulnerability reported to vendor
  • 2024-12-20 - Coordinated public release of advisory
  • 2024-12-20 - Advisory Updated
CREDIT HexRabbit (@h3xr4bb1t) of DEVCORE Research Team
BACK TO ADVISORIES