First published: Thu Nov 07 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix possible double free in smb2_set_ea() Clang static checker(scan-build) warning: fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory. 1304 | kfree(ea); | ^~~~~~~~~ There is a double free in such case: 'ea is initialized to NULL' -> 'first successful memory allocation for ea' -> 'something failed, goto sea_exit' -> 'first memory release for ea' -> 'goto replay_again' -> 'second goto sea_exit before allocate memory for ea' -> 'second memory release for ea resulted in double free'. Re-initialie 'ea' to NULL near to the replay_again label, it can fix this double free problem.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.6.32<6.6.59 | |
Linux Kernel | >=6.8<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50152 has not been officially assigned a severity rating, but it involves a possible double free vulnerability which can lead to memory corruption.
To fix CVE-2024-50152, ensure that you upgrade to the latest version of the Linux kernel that addresses this vulnerability.
CVE-2024-50152 affects Linux kernel versions from 6.8 to 6.11.6 and includes the 6.12-rc1, 6.12-rc2, and 6.12-rc3 releases.
CVE-2024-50152 is classified as a memory management vulnerability due to a possible double free scenario.
While CVE-2024-50152 presents a potential security risk due to double freeing of memory, specific exploitability depends on the context of use.