In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix double put of @cfile in smb2renamepath()
If smb2setpathattr() is called with a valid @cfile and returned -EINVAL, we need to call cifsgetwritablepath() again as the reference of @cfile was already dropped by previous smb2compoundop() call.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "fs/smb/client/smb2inode.c" }, "id": "CVE-2024-46736-2fd7c988", "digest": { "line_hashes": [ "59959263901043943032483012646118975080", "60217504789355222292449695417983202681", "155979800336332714602479200443534235933", "177755084342724528319259476915398334733" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b27ea9c96efd2c252a981fb00d0f001b86c90f3e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "fs/smb/client/smb2inode.c", "function": "smb2_rename_path" }, "id": "CVE-2024-46736-39aeefc4", "digest": { "length": 621.0, "function_hash": "320016356159028382855003118332819059593" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b27ea9c96efd2c252a981fb00d0f001b86c90f3e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "fs/smb/client/smb2inode.c", "function": "smb2_rename_path" }, "id": "CVE-2024-46736-6142cac4", "digest": { "length": 621.0, "function_hash": "320016356159028382855003118332819059593" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3523a3df03c6f04f7ea9c2e7050102657e331a4f" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "fs/smb/client/smb2inode.c", "function": "smb2_rename_path" }, "id": "CVE-2024-46736-99214fc5", "digest": { "length": 621.0, "function_hash": "320016356159028382855003118332819059593" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a46c7f6546b73cbf36f5a618a1a6bbb45391eb3" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "fs/smb/client/smb2inode.c" }, "id": "CVE-2024-46736-aca4fd8d", "digest": { "line_hashes": [ "59959263901043943032483012646118975080", "60217504789355222292449695417983202681", "155979800336332714602479200443534235933", "177755084342724528319259476915398334733" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3523a3df03c6f04f7ea9c2e7050102657e331a4f" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "fs/smb/client/smb2inode.c" }, "id": "CVE-2024-46736-ea32732e", "digest": { "line_hashes": [ "59959263901043943032483012646118975080", "60217504789355222292449695417983202681", "155979800336332714602479200443534235933", "177755084342724528319259476915398334733" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a46c7f6546b73cbf36f5a618a1a6bbb45391eb3" } ] }