First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp ksmbd_user_session_put should be called under smb3_preauth_hash_rsp(). It will avoid freeing session before calling smb3_preauth_hash_rsp().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.1.117 | |
Linux Kernel | >=6.2<6.6.61 | |
Linux Kernel | >=6.7<6.11.8 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50283 is considered to be of medium severity due to the potential for use-after-free vulnerabilities in the Linux kernel's ksmbd.
To fix CVE-2024-50283, update to a fixed version of the Linux kernel that addresses the issue, such as versions after the vulnerability was patched.
CVE-2024-50283 affects multiple versions of the Linux kernel including those between 6.2 and 6.1.117, 6.7 and 6.11.8, as well as specific release candidates.
CVE-2024-50283 impacts the ksmbd component of the Linux kernel, specifically in the handling of smb3_preauth_hash_rsp.
Failure to address CVE-2024-50283 could lead to security risks, potentially allowing attackers to exploit memory corruption vulnerabilities.