33 lines
1.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-50120",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-05T18:15:15.023",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Handle kstrdup failures for passwords\n\nIn smb3_reconfigure(), after duplicating ctx->password and\nctx->password2 with kstrdup(), we need to check for allocation\nfailures.\n\nIf ses->password allocation fails, return -ENOMEM.\nIf ses->password2 allocation fails, free ses->password, set it\nto NULL, and return -ENOMEM."
},
{
"lang": "es",
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: Manejar errores de kstrdup para contrase\u00f1as. En smb3_reconfigure(), despu\u00e9s de duplicar ctx->password y ctx->password2 con kstrdup(), debemos verificar si hay errores de asignaci\u00f3n. Si la asignaci\u00f3n de ses->password falla, devuelva -ENOMEM. Si la asignaci\u00f3n de ses->password2 falla, libere ses->password, config\u00farelo en NULL y devuelva -ENOMEM."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/35488799b0ab6e4327f82e1d9209a60805665b37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/35dbac8c328d6afe937cd45ecd41d209d0b9f8b8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9a5dd61151399ad5a5d69aad28ab164734c1e3bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}