We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50086

ksmbd: fix user-after-free from session log off



AssignerLinux
Reserved2024-10-21
Published2024-10-29
Updated2024-11-08

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix user-after-free from session log off There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add session_lock when setting SMB2_SESSION_EXPIRED and referece count to session struct not to free session while it is being used.

Product status

Default status
unaffected

1da177e4c3f4 before 0f62358ce85b
affected

1da177e4c3f4 before a9839c37fd81
affected

1da177e4c3f4 before 5511999e9615
affected

1da177e4c3f4 before ee371898b53a
affected

1da177e4c3f4 before 7aa8804c0b67
affected

Default status
affected

5.15.171
unaffected

6.1.114
unaffected

6.6.58
unaffected

6.11.5
unaffected

6.12-rc4
unaffected

References

https://git.kernel.org/stable/c/0f62358ce85b2d4c949ef1b648be01b29cec667a

https://git.kernel.org/stable/c/a9839c37fd813b432988f58a9d9dd59253d3eb2c

https://git.kernel.org/stable/c/5511999e9615e4318e9142d23b29bd1597befc08

https://git.kernel.org/stable/c/ee371898b53a9b9b51c02d22a8c31bfb86d45f0d

https://git.kernel.org/stable/c/7aa8804c0b67b3cb263a472d17f2cb50d7f1a930

cve.org CVE-2024-50086

nvd.nist.gov CVE-2024-50086

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50086
Subscribe to our newsletter to learn more about our work.