CVE-2024-50086

Source
https://cve.org/CVERecord?id=CVE-2024-50086
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50086.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50086
Downstream
Related
Published
2024-10-29T00:50:29.284Z
Modified
2026-05-07T04:17:36.807166Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ksmbd: fix user-after-free from session log off
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix user-after-free from session log off

There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add sessionlock when setting SMB2SESSION_EXPIRED and referece count to session struct not to free session while it is being used.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50086.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
0f62358ce85b2d4c949ef1b648be01b29cec667a
Fixed
a9839c37fd813b432988f58a9d9dd59253d3eb2c
Fixed
5511999e9615e4318e9142d23b29bd1597befc08
Fixed
ee371898b53a9b9b51c02d22a8c31bfb86d45f0d
Fixed
7aa8804c0b67b3cb263a472d17f2cb50d7f1a930

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50086.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.171
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.114
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.58
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50086.json"