CVE-2024-26822

Source
https://cve.org/CVERecord?id=CVE-2024-26822
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26822.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26822
Downstream
Related
Published
2024-04-17T09:43:49.221Z
Modified
2026-03-13T07:53:41.294440Z
Summary
smb: client: set correct id, uid and cruid for multiuser automounts
Details

In the Linux kernel, the following vulnerability has been resolved:

smb: client: set correct id, uid and cruid for multiuser automounts

When uid, gid and cruid are not specified, we need to dynamically set them into the filesystem context used for automounting otherwise they'll end up reusing the values from the parent mount.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26822.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c8117ac42303f7ae99bbe53e4952f7d147cca1fb
Fixed
4a6e4c56721a3e6e2550b72ec56aab306c4607a7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
60e3318e3e900ba1ddfead937012b3432dfccc92
Fixed
2ceba8ae1bd1f5589548cb722a5c583ca3a2dede
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9fd29a5bae6e8f94b410374099a6fddb253d2d5f
Fixed
c2aa2718cda2d56b4a551cb40043e9abc9684626
Fixed
7590ba9057c6d74c66f3b909a383ec47cd2f27fb
Fixed
4508ec17357094e2075f334948393ddedbb75157

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26822.json"