In the Linux kernel, the following vulnerability has been resolved:
smb: client: Handle kstrdup failures for passwords
In smb3_reconfigure(), after duplicating ctx->password and ctx->password2 with kstrdup(), we need to check for allocation failures.
If ses->password allocation fails, return -ENOMEM. If ses->password2 allocation fails, free ses->password, set it to NULL, and return -ENOMEM.
[ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35488799b0ab6e4327f82e1d9209a60805665b37", "signature_version": "v1", "target": { "function": "smb3_reconfigure", "file": "fs/smb/client/fs_context.c" }, "digest": { "function_hash": "259489320086248727188710900708201988841", "length": 1098.0 }, "id": "CVE-2024-50120-0a555547" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a5dd61151399ad5a5d69aad28ab164734c1e3bc", "signature_version": "v1", "target": { "file": "fs/smb/client/fs_context.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "168196176673286830287865455290393964860", "275775839575739802794280921660213407109", "238817253602874612603499027492668944034", "142874867300546739629207792117715774594", "165776933912873670751251461528986673398", "44939684193259506646393345558471342" ] }, "id": "CVE-2024-50120-2eefc886" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35dbac8c328d6afe937cd45ecd41d209d0b9f8b8", "signature_version": "v1", "target": { "function": "smb3_reconfigure", "file": "fs/smb/client/fs_context.c" }, "digest": { "function_hash": "259489320086248727188710900708201988841", "length": 1098.0 }, "id": "CVE-2024-50120-52caa111" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a5dd61151399ad5a5d69aad28ab164734c1e3bc", "signature_version": "v1", "target": { "function": "smb3_reconfigure", "file": "fs/smb/client/fs_context.c" }, "digest": { "function_hash": "259489320086248727188710900708201988841", "length": 1098.0 }, "id": "CVE-2024-50120-72d8138b" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35dbac8c328d6afe937cd45ecd41d209d0b9f8b8", "signature_version": "v1", "target": { "file": "fs/smb/client/fs_context.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "168196176673286830287865455290393964860", "275775839575739802794280921660213407109", "238817253602874612603499027492668944034", "142874867300546739629207792117715774594", "165776933912873670751251461528986673398", "44939684193259506646393345558471342" ] }, "id": "CVE-2024-50120-a60be8da" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35488799b0ab6e4327f82e1d9209a60805665b37", "signature_version": "v1", "target": { "file": "fs/smb/client/fs_context.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "168196176673286830287865455290393964860", "275775839575739802794280921660213407109", "238817253602874612603499027492668944034", "142874867300546739629207792117715774594", "165776933912873670751251461528986673398", "44939684193259506646393345558471342" ] }, "id": "CVE-2024-50120-fa7393a0" } ]