Cyber Posture

CVE-2024-57925

High

Published: 19 January 2025

Published
19 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0005 15.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57925 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 15.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-11 (Error Handling).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of the NULL pointer dereference flaw in the ksmbd module by applying the specified upstream kernel patches to prevent exploitation.

prevent

Addresses the root cause by requiring systems to handle allocation failures and errors gracefully without leading to illegal memory accesses or crashes.

prevent

Provides kernel-level memory protections that mitigate potential corruption or crashes from the illegal memory write triggered by the NULL pointer dereference.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local kernel memory corruption vulnerability in ksmbd enables exploitation for privilege escalation by a low-privileged attacker.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix a missing return value check bug In the smb2_send_interim_resp(), if ksmbd_alloc_work_struct() fails to allocate a node, it returns a NULL pointer to the in_work pointer. This can lead…

more

to an illegal memory write of in_work->response_buf when allocate_interim_rsp_buf() attempts to perform a kzalloc() on it. To address this issue, incorporating a check for the return value of ksmbd_alloc_work_struct() ensures that the function returns immediately upon allocation failure, thereby preventing the aforementioned illegal memory access.

Deeper analysisAI

CVE-2024-57925 is a NULL pointer dereference vulnerability (CWE-476) in the Linux kernel's ksmbd module, which implements the SMB server protocol. The issue occurs in the smb2_send_interim_resp() function, where a failure of ksmbd_alloc_work_struct() to allocate a work structure results in a NULL pointer being assigned to in_work. Without checking this return value, the subsequent allocate_interim_rsp_buf() function attempts a kzalloc() on the NULL pointer, causing an illegal memory write. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability by triggering the smb2_send_interim_resp() path under conditions where memory allocation fails, such as in low-memory scenarios. Successful exploitation leads to high integrity and availability impacts, potentially resulting in kernel crashes, denial of service, or memory corruption, though confidentiality is not affected.

Mitigation requires applying the relevant upstream kernel patches, as detailed in the stable kernel commit references: 271ae0edbfc942795c162e6cf20d2bc02bd7fde4, 2976e91a3e569cf2c92c9f71512c0ab1312fe965, 4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c, 781c743e18bfd9b7dc0383f036ae952bd1486f21, and ee7e40f7fb17f08a8cbae50553e5c2e10ae32fce. These commits add a return value check for ksmbd_alloc_work_struct() to ensure the function exits early on allocation failure, preventing the illegal memory access.

Details

CWE(s)

Affected Products

linux
linux kernel
6.13 · 5.15.145 — 5.16 · 6.1.71 — 6.1.125 · 6.6 — 6.6.72

CVEs Like This One

CVE-2026-31453Same product: Linux Linux Kernel
CVE-2026-23198Same product: Linux Linux Kernel
CVE-2024-57798Same product: Linux Linux Kernel
CVE-2026-31657Same product: Linux Linux Kernel
CVE-2026-31694Same product: Linux Linux Kernel
CVE-2026-31641Same product: Linux Linux Kernel
CVE-2026-31663Same product: Linux Linux Kernel
CVE-2026-23336Same product: Linux Linux Kernel
CVE-2025-21858Same product: Linux Linux Kernel
CVE-2026-31454Same product: Linux Linux Kernel

References