In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
Nov 7, 2024
to the GitHub Advisory Database
•
Updated Nov 13, 2024
Description
Published by the National Vulnerability Database
Nov 7, 2024
Published to the GitHub Advisory Database
Nov 7, 2024
Last updated
Nov 13, 2024
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix possible double free in smb2_set_ea()
Clang static checker(scan-build) warning:
fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory.
1304 | kfree(ea);
| ^~~~~~~~~
There is a double free in such case:
'ea is initialized to NULL' -> 'first successful memory allocation for
ea' -> 'something failed, goto sea_exit' -> 'first memory release for ea'
-> 'goto replay_again' -> 'second goto sea_exit before allocate memory
for ea' -> 'second memory release for ea resulted in double free'.
Re-initialie 'ea' to NULL near to the replay_again label, it can fix this
double free problem.
References