CVE-2024-46795
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's ksmbd SMB server module allows attackers to cause a kernel panic (denial of service) when reusing connections with binding sessions. This affects Linux systems running ksmbd with SMB3 encryption enabled. The vulnerability can be triggered remotely by authenticated users.
💻 Affected Systems
- Linux kernel with ksmbd module
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Remote kernel panic leading to system crash and denial of service, potentially disrupting SMB file sharing services.
Likely Case
Denial of service affecting SMB services when attackers trigger the condition through connection reuse.
If Mitigated
No impact if patched or if ksmbd is not in use.
🎯 Exploit Status
Requires authenticated SMB session and ability to trigger connection reuse with binding sessions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 41bc256da7e47b679df87c7fc7a5b393052b9cce or later
Vendor Advisory: https://git.kernel.org/stable/c/41bc256da7e47b679df87c7fc7a5b393052b9cce
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify ksmbd module loads correctly.
🔧 Temporary Workarounds
Disable ksmbd module
linuxUnload ksmbd module if not required for SMB file sharing
sudo rmmod ksmbd
echo 'blacklist ksmbd' | sudo tee /etc/modprobe.d/ksmbd-blacklist.conf
Disable SMB3 encryption
linuxConfigure ksmbd to not use SMB3 encryption if possible
# Configure ksmbd.conf to disable encryption (check ksmbd documentation for specific parameters)
🧯 If You Can't Patch
- Restrict SMB access to trusted networks only using firewall rules
- Monitor for kernel panic logs and connection reuse patterns
🔍 How to Verify
Check if Vulnerable:
Check if ksmbd module is loaded: lsmod | grep ksmbd. Check kernel version against patched commits.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits and test SMB connection reuse scenarios.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning 'NULL pointer dereference' in ksmbd context
- ksmbd error logs about session setup failures
Network Indicators:
- Multiple SMB session setup requests on same connection
- SMB service disruption patterns
SIEM Query:
source="kernel" AND "NULL pointer dereference" AND "ksmbd" OR source="ksmbd" AND "session setup" AND error
🔗 References
- https://git.kernel.org/stable/c/41bc256da7e47b679df87c7fc7a5b393052b9cce
- https://git.kernel.org/stable/c/4c8496f44f5bb5c06cdef5eb130ab259643392a1
- https://git.kernel.org/stable/c/78c5a6f1f630172b19af4912e755e1da93ef0ab5
- https://git.kernel.org/stable/c/93d54a4b59c4b3d803d20aa645ab5ca71f3b3b02
- https://git.kernel.org/stable/c/9914f1bd61d5e838bb1ab15a71076d37a6db65d1
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html