CVE-2024-49988

medium

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: add refcnt to ksmbd_conn struct When sending an oplock break request, opinfo->conn is used, But freed ->conn can be used on multichannel. This patch add a reference count to the ksmbd_conn struct so that it can be freed when it is no longer used.

References

https://git.kernel.org/stable/c/ee426bfb9d09b29987369b897fe9b6485ac2be27

https://git.kernel.org/stable/c/e9dac92f4482a382e8c0fe1bc243da5fc3526b0c

https://git.kernel.org/stable/c/9fd3cde4628bcd3549ab95061f2bab74d2ed4f3b

https://git.kernel.org/stable/c/18f06bacc197d4ac9b518ad1c69999bc3d83e7aa

Details

Source: Mitre, NVD

Published: 2024-10-21

Updated: 2024-10-28

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium