CVE-2024-50152

Severity CVSS v4.0:
Pending analysis
Type:
CWE-415 Double Free
Publication date:
07/11/2024
Last modified:
19/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> smb: client: fix possible double free in smb2_set_ea()<br /> <br /> Clang static checker(scan-build) warning:<br /> fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory.<br /> 1304 | kfree(ea);<br /> | ^~~~~~~~~<br /> <br /> There is a double free in such case:<br /> &amp;#39;ea is initialized to NULL&amp;#39; -&gt; &amp;#39;first successful memory allocation for<br /> ea&amp;#39; -&gt; &amp;#39;something failed, goto sea_exit&amp;#39; -&gt; &amp;#39;first memory release for ea&amp;#39;<br /> -&gt; &amp;#39;goto replay_again&amp;#39; -&gt; &amp;#39;second goto sea_exit before allocate memory<br /> for ea&amp;#39; -&gt; &amp;#39;second memory release for ea resulted in double free&amp;#39;.<br /> <br /> Re-initialie &amp;#39;ea&amp;#39; to NULL near to the replay_again label, it can fix this<br /> double free problem.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.32 (including) 6.6.59 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.11.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*