CVE-2024-50120

medium

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: Handle kstrdup failures for passwords In smb3_reconfigure(), after duplicating ctx->password and ctx->password2 with kstrdup(), we need to check for allocation failures. If ses->password allocation fails, return -ENOMEM. If ses->password2 allocation fails, free ses->password, set it to NULL, and return -ENOMEM.

References

https://git.kernel.org/stable/c/9a5dd61151399ad5a5d69aad28ab164734c1e3bc

https://git.kernel.org/stable/c/35dbac8c328d6afe937cd45ecd41d209d0b9f8b8

https://git.kernel.org/stable/c/35488799b0ab6e4327f82e1d9209a60805665b37

Details

Source: Mitre, NVD

Published: 2024-11-05

Updated: 2024-11-08

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium