In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix slab-use-after-free in smb3preauthhash_rsp
ksmbdusersessionput should be called under smb3preauthhashrsp(). It will avoid freeing session before calling smb3preauthhash_rsp().
[
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c",
"function": "__handle_ksmbd_work"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c6cdc08c25a868a08068dfc319fa9fce982b8e7f",
"digest": {
"length": 2039.0,
"function_hash": "228347594292408852589282696709103728413"
},
"id": "CVE-2024-50283-13a2ac75"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c6cdc08c25a868a08068dfc319fa9fce982b8e7f",
"digest": {
"line_hashes": [
"317178407871872525011681214750830318148",
"36876266559547073824233180095232331034",
"10258215995795734669525122224997055263",
"325508751012506703728848187248983551774",
"243809215850900003040075426474520364031",
"142174708923605847433735200791482113769",
"70396383598979980621858249794773429259",
"239974696079299639064152921794376028703"
],
"threshold": 0.9
},
"id": "CVE-2024-50283-2842200c"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "fs/ksmbd/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb645064e0811053c94e86677f2e58ed29359d62",
"digest": {
"line_hashes": [
"317178407871872525011681214750830318148",
"36876266559547073824233180095232331034",
"10258215995795734669525122224997055263",
"325508751012506703728848187248983551774",
"243809215850900003040075426474520364031",
"142174708923605847433735200791482113769",
"70396383598979980621858249794773429259",
"239974696079299639064152921794376028703"
],
"threshold": 0.9
},
"id": "CVE-2024-50283-48c8d15a"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c",
"function": "__handle_ksmbd_work"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7557bbca40d4ca8bb1c6c940ac6c95078bd0827",
"digest": {
"length": 2039.0,
"function_hash": "228347594292408852589282696709103728413"
},
"id": "CVE-2024-50283-6adb1cdd"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b6ad475d4ed577d34e0157eb507be00c588bf5c",
"digest": {
"line_hashes": [
"317178407871872525011681214750830318148",
"36876266559547073824233180095232331034",
"10258215995795734669525122224997055263",
"325508751012506703728848187248983551774",
"243809215850900003040075426474520364031",
"142174708923605847433735200791482113769",
"70396383598979980621858249794773429259",
"239974696079299639064152921794376028703"
],
"threshold": 0.9
},
"id": "CVE-2024-50283-7ff367d5"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b8fc56fbca7482c1e5c0e3351c6ae78982e25ada",
"digest": {
"line_hashes": [
"317178407871872525011681214750830318148",
"36876266559547073824233180095232331034",
"10258215995795734669525122224997055263",
"325508751012506703728848187248983551774",
"243809215850900003040075426474520364031",
"142174708923605847433735200791482113769",
"70396383598979980621858249794773429259",
"239974696079299639064152921794376028703"
],
"threshold": 0.9
},
"id": "CVE-2024-50283-9ba137e6"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c",
"function": "__handle_ksmbd_work"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b6ad475d4ed577d34e0157eb507be00c588bf5c",
"digest": {
"length": 2039.0,
"function_hash": "228347594292408852589282696709103728413"
},
"id": "CVE-2024-50283-d44acd82"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "fs/ksmbd/server.c",
"function": "__handle_ksmbd_work"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb645064e0811053c94e86677f2e58ed29359d62",
"digest": {
"length": 2039.0,
"function_hash": "228347594292408852589282696709103728413"
},
"id": "CVE-2024-50283-e7b69df7"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c",
"function": "__handle_ksmbd_work"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b8fc56fbca7482c1e5c0e3351c6ae78982e25ada",
"digest": {
"length": 2039.0,
"function_hash": "228347594292408852589282696709103728413"
},
"id": "CVE-2024-50283-eddf4c37"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "fs/smb/server/server.c"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f7557bbca40d4ca8bb1c6c940ac6c95078bd0827",
"digest": {
"line_hashes": [
"317178407871872525011681214750830318148",
"36876266559547073824233180095232331034",
"10258215995795734669525122224997055263",
"325508751012506703728848187248983551774",
"243809215850900003040075426474520364031",
"142174708923605847433735200791482113769",
"70396383598979980621858249794773429259",
"239974696079299639064152921794376028703"
],
"threshold": 0.9
},
"id": "CVE-2024-50283-f0156975"
}
]