In the Linux kernel, the following vulnerability has been resolved:
cifs: fix potential null pointer use in destroyworkqueue in initcifs error path
Dan Carpenter reported a Smack static checker warning: fs/smb/client/cifsfs.c:1981 initcifs() error: we previously assumed 'serverclosewq' could be null (see line 1895)
The patch which introduced the serverclose workqueue used the wrong oredering in error paths in init_cifs() for freeing it on errors.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42307.json"
}