Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create There is a race condition between ksmbd_smb2_session_create and ksmbd_expire_session. This patch add missing sessions_table_lock while adding/deleting session from global session table.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.1.117 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0a77715db22611df50b178374c51e2ba0d58866ePatch
- https://git.kernel.org/stable/c/e7a2ad2044377853cf8c59528dac808a08a99c72Patch
- https://git.kernel.org/stable/c/e923503a56b3385b64ae492e3225e4623f560c5bPatch
- https://git.kernel.org/stable/c/f56446ba5378d19e31040b548a14ee9a8f1500eaPatch
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
FAQ
What is CVE-2024-50286?
CVE-2024-50286 is a vulnerability with a CVSS score of 7.0 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create There is a race condition between ksmbd_smb2_session_create and ksmbd_...
How severe is CVE-2024-50286?
CVE-2024-50286 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50286?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.