Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-46736— smb: client: fix double put of @cfile in smb2_rename_path()

EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-46736

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
smb: client: fix double put of @cfile in smb2_rename_path()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix double put of @cfile in smb2_rename_path() If smb2_set_path_attr() is called with a valid @cfile and returned -EINVAL, we need to call cifs_get_writable_path() again as the reference of @cfile was already dropped by previous smb2_compound_op() call.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于存在双重释放问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 1e60bc0e954389af82f1d9a85f13a63f6572350f ~ b27ea9c96efd2c252a981fb00d0f001b86c90f3e -
LinuxLinux 6.9 -

II. Public POCs for CVE-2024-46736

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-46736

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-18 · 85 CVEs total

CVE-2024-46770ice: Add netif_device_attach/detach into PF reset flow
CVE-2024-46781nilfs2: fix missing cleanup on rollforward recovery error
CVE-2024-46768hwmon: (hp-wmi-sensors) Check if WMI event data exists
CVE-2024-46769spi: intel: Add check devm_kasprintf() returned value
CVE-2024-46767net: phy: Fix missing of_node_put() for leds
CVE-2024-46765ice: protect XDP configuration with a mutex
CVE-2024-46763fou: Fix null-ptr-deref in GRO.
CVE-2024-46762xen: privcmd: Fix possible access to a freed kirqfd instance
CVE-2024-46761pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
CVE-2024-46764bpf: add check for invalid name in btf_name_valid_section()
CVE-2024-46771can: bcm: Remove proc entry when dev is unregistered.
CVE-2024-46772drm/amd/display: Check denominator crb_pipes before used
CVE-2024-46773drm/amd/display: Check denominator pbn_div before used
CVE-2024-46774powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
CVE-2024-46775drm/amd/display: Validate function returns
CVE-2024-46776drm/amd/display: Run DC_LOG_DC after checking link->link_enc
CVE-2024-46777udf: Avoid excessive partition lengths
CVE-2024-46778drm/amd/display: Check UnboundedRequestEnabled's value
CVE-2024-46779drm/imagination: Free pvr_vm_gpuva after unlink
CVE-2024-46780nilfs2: protect references to superblock parameters exposed in sysfs

Showing top 20 of 85 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-46736

No comments yet


Leave a comment