CVE-2024-53185NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateApr 24

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix NULL ptr deref in crypto_aead_setkey() Neither SMB3.0 or SMB3.02 supports encryption negotiate context, so when SMB2_GLOBAL_CAP_ENCRYPTION flag is set in the negotiate response, the client uses AES-128-CCM as the default cipher. See MS-SMB2 3.3.5.4. Commit b0abcd65ec54 ("smb: client: fix UAF in async decryption") added a @server->cipher_type check to conditionally call smb3_crypto_aead_allocate(), but that ch

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

Patches

🔴Vulnerability Details

8
OSV
linux-hwe-6.8 vulnerabilities2025-04-24
OSV
linux, linux-aws, linux-azure, linux-azure-6.8, linux-ibm, linux-lowlatency, linux-lowlatency-hwe-6.8, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux-oem-6.8, linux-oracle, linux-oracl2025-04-23
OSV
linux-realtime vulnerabilities2025-04-23
OSV
linux-gcp-6.8 vulnerabilities2025-04-23
OSV
linux-aws-6.8 vulnerabilities2025-04-23

📋Vendor Advisories

9
Ubuntu
Linux kernel (HWE) vulnerabilities2025-04-24
Ubuntu
Linux kernel (Real-time) vulnerabilities2025-04-23
Ubuntu
Linux kernel vulnerabilities2025-04-23
Ubuntu
Linux kernel vulnerabilities2025-04-23
Ubuntu
Linux kernel vulnerabilities2025-04-23
CVE-2024-53185 — NULL Pointer Dereference in Linux | cvebase