
5/11/2024

19/12/2024
CVE-2024-50120: smb: client: Handle kstrdup failures for passwords
First published: Tue Nov 05 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved:
smb: client: Handle kstrdup failures for passwords
In smb3_reconfigure(), after duplicating ctx->password and
ctx->password2 with kstrdup(), we need to check for allocation
failures.
If ses->password allocation fails, return -ENOMEM.
If ses->password2 allocation fails, free ses->password, set it
to NULL, and return -ENOMEM.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|
Linux Kernel | >=6.6.24<6.6.59 | |
Linux Kernel | >=6.7.12<6.8 | |
Linux Kernel | >=6.8.3<6.9 | |
Linux Kernel | >=6.9<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
debian/linux | | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-50120?
CVE-2024-50120 is classified as a medium severity vulnerability due to potential memory allocation failures in the Linux kernel's SMB client.
How do I fix CVE-2024-50120?
Upgrading to versions of the Linux kernel that are not affected, specifically after the patches following version 6.12-rc4, can address CVE-2024-50120.
Which Linux kernel versions are affected by CVE-2024-50120?
Linux kernel versions from 6.6.24 to 6.6.59, as well as several versions between 6.7.12 to 6.8, and 6.9 to 6.11.6 are affected by CVE-2024-50120.
What impact does CVE-2024-50120 have on system security?
CVE-2024-50120 could potentially lead to denial of service due to unhandled memory allocation failures in the SMB client.
Is CVE-2024-50120 related to any specific component of the Linux kernel?
CVE-2024-50120 specifically affects the SMB client in the Linux kernel, particularly in the password handling mechanism.
- agent/title
- agent/references
- agent/type
- agent/description
- agent/first-publish-date
- agent/author
- agent/event
- agent/remedy
- agent/severity
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/source
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- agent/softwarecombine
- agent/tags
- collector/usn-cve
- source/Ubuntu
- collector/security-tracker-debian
- source/Debian
- collector/nvd-cve
- vendor/linux
- canonical/linux kernel
- version/linux kernel/6.6.24
- version/linux kernel/6.7.12
- version/linux kernel/6.8.3
- version/linux kernel/6.9
- version/linux kernel/6.12-rc1
- version/linux kernel/6.12-rc2
- version/linux kernel/6.12-rc3
- version/linux kernel/6.12-rc4
- package-manager/debian
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203