CVE-2024-50086

Source
https://cve.org/CVERecord?id=CVE-2024-50086
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50086.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50086
Downstream
Related
Published
2024-10-29T00:50:29.284Z
Modified
2026-03-20T12:39:34.649360Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ksmbd: fix user-after-free from session log off
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix user-after-free from session log off

There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add sessionlock when setting SMB2SESSION_EXPIRED and referece count to session struct not to free session while it is being used.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50086.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0626e6641f6b467447c81dd7678a69c66f7746cf
Fixed
0f62358ce85b2d4c949ef1b648be01b29cec667a
Fixed
a9839c37fd813b432988f58a9d9dd59253d3eb2c
Fixed
5511999e9615e4318e9142d23b29bd1597befc08
Fixed
ee371898b53a9b9b51c02d22a8c31bfb86d45f0d
Fixed
7aa8804c0b67b3cb263a472d17f2cb50d7f1a930

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50086.json"