In the Linux kernel, the following vulnerability has been resolved: smb: client: Handle kstrdup failures for passwords In smb3_reconfigure(), after duplicating ctx->password and ctx->password2 with kstrdup(), we need to check for allocation failures. If ses->password allocation fails, return -ENOMEM. If ses->password2 allocation fails, free ses->password, set it to NULL, and return -ENOMEM.
https://git.kernel.org/stable/c/9a5dd61151399ad5a5d69aad28ab164734c1e3bc
https://git.kernel.org/stable/c/35dbac8c328d6afe937cd45ecd41d209d0b9f8b8
https://git.kernel.org/stable/c/35488799b0ab6e4327f82e1d9209a60805665b37