We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50152

smb: client: fix possible double free in smb2_set_ea()



Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix possible double free in smb2_set_ea() Clang static checker(scan-build) warning: fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory. 1304 | kfree(ea); | ^~~~~~~~~ There is a double free in such case: 'ea is initialized to NULL' -> 'first successful memory allocation for ea' -> 'something failed, goto sea_exit' -> 'first memory release for ea' -> 'goto replay_again' -> 'second goto sea_exit before allocate memory for ea' -> 'second memory release for ea resulted in double free'. Re-initialie 'ea' to NULL near to the replay_again label, it can fix this double free problem.

Reserved 2024-10-21 | Published 2024-11-07 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

433042a91f93 before b1813c220b76
affected

4f1fffa23769 before c9f758ecf256
affected

4f1fffa23769 before 19ebc1e6cab3
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.6.59
unaffected

6.11.6
unaffected

6.12
unaffected

References

git.kernel.org/...c/b1813c220b76f60b1727984794377c4aa849d4c1

git.kernel.org/...c/c9f758ecf2562dfdd4adf12c22921b5de8366123

git.kernel.org/...c/19ebc1e6cab334a8193398d4152deb76019b5d34

cve.org (CVE-2024-50152)

nvd.nist.gov (CVE-2024-50152)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50152

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.