In the Linux kernel, the following vulnerability has been resolved:
smb: client: Handle kstrdup failures for passwords
In smb3_reconfigure(), after duplicating ctx->password and ctx->password2 with kstrdup(), we need to check for allocation failures.
If ses->password allocation fails, return -ENOMEM. If ses->password2 allocation fails, free ses->password, set it to NULL, and return -ENOMEM.
[
{
"id": "CVE-2024-50120-0a555547",
"digest": {
"length": 1098.0,
"function_hash": "259489320086248727188710900708201988841"
},
"deprecated": false,
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_reconfigure"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35488799b0ab6e4327f82e1d9209a60805665b37",
"signature_type": "Function",
"signature_version": "v1"
},
{
"id": "CVE-2024-50120-2eefc886",
"digest": {
"line_hashes": [
"168196176673286830287865455290393964860",
"275775839575739802794280921660213407109",
"238817253602874612603499027492668944034",
"142874867300546739629207792117715774594",
"165776933912873670751251461528986673398",
"44939684193259506646393345558471342"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "fs/smb/client/fs_context.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a5dd61151399ad5a5d69aad28ab164734c1e3bc",
"signature_type": "Line",
"signature_version": "v1"
},
{
"id": "CVE-2024-50120-52caa111",
"digest": {
"length": 1098.0,
"function_hash": "259489320086248727188710900708201988841"
},
"deprecated": false,
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_reconfigure"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35dbac8c328d6afe937cd45ecd41d209d0b9f8b8",
"signature_type": "Function",
"signature_version": "v1"
},
{
"id": "CVE-2024-50120-72d8138b",
"digest": {
"length": 1098.0,
"function_hash": "259489320086248727188710900708201988841"
},
"deprecated": false,
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_reconfigure"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9a5dd61151399ad5a5d69aad28ab164734c1e3bc",
"signature_type": "Function",
"signature_version": "v1"
},
{
"id": "CVE-2024-50120-a60be8da",
"digest": {
"line_hashes": [
"168196176673286830287865455290393964860",
"275775839575739802794280921660213407109",
"238817253602874612603499027492668944034",
"142874867300546739629207792117715774594",
"165776933912873670751251461528986673398",
"44939684193259506646393345558471342"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "fs/smb/client/fs_context.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35dbac8c328d6afe937cd45ecd41d209d0b9f8b8",
"signature_type": "Line",
"signature_version": "v1"
},
{
"id": "CVE-2024-50120-fa7393a0",
"digest": {
"line_hashes": [
"168196176673286830287865455290393964860",
"275775839575739802794280921660213407109",
"238817253602874612603499027492668944034",
"142874867300546739629207792117715774594",
"165776933912873670751251461528986673398",
"44939684193259506646393345558471342"
],
"threshold": 0.9
},
"deprecated": false,
"target": {
"file": "fs/smb/client/fs_context.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35488799b0ab6e4327f82e1d9209a60805665b37",
"signature_type": "Line",
"signature_version": "v1"
}
]