CVE-2024-41030

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41030
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41030.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41030
Downstream
Related
Published
2024-07-29T14:31:46Z
Modified
2025-10-14T19:35:31.554172Z
Summary
ksmbd: discard write access to the directory open
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: discard write access to the directory open

may_open() does not allow a directory to be opened with the write access. However, some writing flags set by client result in adding write access on server, making ksmbd incompatible with FUSE file system. Simply, let's discard the write access when opening a directory.

listadd corruption. next is NULL. ------------[ cut here ]------------ kernel BUG at lib/listdebug.c:26! pc : _listaddvalid+0x88/0xbc lr : _listaddvalid+0x88/0xbc Call trace: _listaddvalid+0x88/0xbc fusefinishopen+0x11c/0x170 fuseopencommon+0x284/0x5e8 fusediropen+0x14/0x24 dodentryopen+0x2a4/0x4e0 dentryopen+0x50/0x80 smb2open+0xbe4/0x15a4 handleksmbdwork+0x478/0x5ec processonework+0x1b4/0x448 workerthread+0x25c/0x430 kthread+0x104/0x1d4 retfromfork+0x10/0x20

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
66cf853e1c7a2407f15d9f7aaa3e47d61745e361
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
9e84b1ba5c98fb5c9f869c85db1d870354613baa
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
198498b2049c0f11f7670be6974570e02b0cc035
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd

Affected versions

v5.*

v5.13
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7
v6.9.1
v6.9.2
v6.9.3
v6.9.4
v6.9.5
v6.9.6
v6.9.7
v6.9.8
v6.9.9

Database specific

{
    "vanir_signatures": [
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e84b1ba5c98fb5c9f869c85db1d870354613baa",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_open"
            },
            "id": "CVE-2024-41030-1a6c5a49",
            "digest": {
                "function_hash": "338183489864569665357169734715599930618",
                "length": 20236.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66cf853e1c7a2407f15d9f7aaa3e47d61745e361",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_open"
            },
            "id": "CVE-2024-41030-2c54a9f1",
            "digest": {
                "function_hash": "338340018729798991917955135592837374701",
                "length": 18326.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e84b1ba5c98fb5c9f869c85db1d870354613baa",
            "signature_type": "Line",
            "target": {
                "file": "fs/smb/server/smb2pdu.c"
            },
            "id": "CVE-2024-41030-2d86c461",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "256697792194347961478375874630888854033",
                    "218187935734814722565533574448336516212",
                    "56902770549326722969568602542866775452",
                    "180390581910044006921414060092324485522",
                    "141948532231309071961101892850616842031",
                    "216132636311164131980002306602939407216",
                    "273107316280616458054713808295580737982",
                    "216043520838731686728748682040596161688",
                    "320248263551818273323463077549018886989",
                    "158537958090241790624368867805943809021",
                    "167268405700074903871359293877325280294",
                    "261171612008919323430882366892126528701"
                ]
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66cf853e1c7a2407f15d9f7aaa3e47d61745e361",
            "signature_type": "Line",
            "target": {
                "file": "fs/smb/server/smb2pdu.c"
            },
            "id": "CVE-2024-41030-5f130dac",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "256697792194347961478375874630888854033",
                    "218187935734814722565533574448336516212",
                    "56902770549326722969568602542866775452",
                    "180390581910044006921414060092324485522",
                    "141948532231309071961101892850616842031",
                    "216132636311164131980002306602939407216",
                    "273107316280616458054713808295580737982",
                    "216043520838731686728748682040596161688",
                    "320248263551818273323463077549018886989",
                    "158537958090241790624368867805943809021",
                    "167268405700074903871359293877325280294",
                    "261171612008919323430882366892126528701"
                ]
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@66cf853e1c7a2407f15d9f7aaa3e47d61745e361",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_create_open_flags"
            },
            "id": "CVE-2024-41030-7d57e56a",
            "digest": {
                "function_hash": "158212857185584942426578490888697940460",
                "length": 996.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@198498b2049c0f11f7670be6974570e02b0cc035",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_open"
            },
            "id": "CVE-2024-41030-8268f6b9",
            "digest": {
                "function_hash": "338183489864569665357169734715599930618",
                "length": 20236.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_open"
            },
            "id": "CVE-2024-41030-9f02b9df",
            "digest": {
                "function_hash": "338183489864569665357169734715599930618",
                "length": 20236.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd",
            "signature_type": "Line",
            "target": {
                "file": "fs/smb/server/smb2pdu.c"
            },
            "id": "CVE-2024-41030-af683639",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "256697792194347961478375874630888854033",
                    "218187935734814722565533574448336516212",
                    "56902770549326722969568602542866775452",
                    "180390581910044006921414060092324485522",
                    "141948532231309071961101892850616842031",
                    "216132636311164131980002306602939407216",
                    "273107316280616458054713808295580737982",
                    "216043520838731686728748682040596161688",
                    "320248263551818273323463077549018886989",
                    "158537958090241790624368867805943809021",
                    "167268405700074903871359293877325280294",
                    "261171612008919323430882366892126528701"
                ]
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_create_open_flags"
            },
            "id": "CVE-2024-41030-ba53d70d",
            "digest": {
                "function_hash": "158212857185584942426578490888697940460",
                "length": 996.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@198498b2049c0f11f7670be6974570e02b0cc035",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_create_open_flags"
            },
            "id": "CVE-2024-41030-cbd2ecc1",
            "digest": {
                "function_hash": "158212857185584942426578490888697940460",
                "length": 996.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9e84b1ba5c98fb5c9f869c85db1d870354613baa",
            "signature_type": "Function",
            "target": {
                "file": "fs/smb/server/smb2pdu.c",
                "function": "smb2_create_open_flags"
            },
            "id": "CVE-2024-41030-e13500d9",
            "digest": {
                "function_hash": "158212857185584942426578490888697940460",
                "length": 996.0
            },
            "deprecated": false,
            "signature_version": "v1"
        },
        {
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@198498b2049c0f11f7670be6974570e02b0cc035",
            "signature_type": "Line",
            "target": {
                "file": "fs/smb/server/smb2pdu.c"
            },
            "id": "CVE-2024-41030-facf84bc",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "256697792194347961478375874630888854033",
                    "218187935734814722565533574448336516212",
                    "56902770549326722969568602542866775452",
                    "180390581910044006921414060092324485522",
                    "141948532231309071961101892850616842031",
                    "216132636311164131980002306602939407216",
                    "273107316280616458054713808295580737982",
                    "216043520838731686728748682040596161688",
                    "320248263551818273323463077549018886989",
                    "158537958090241790624368867805943809021",
                    "167268405700074903871359293877325280294",
                    "261171612008919323430882366892126528701"
                ]
            },
            "deprecated": false,
            "signature_version": "v1"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
6.1.100
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.41
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.10