CVE-2024-58087

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix racy issue from session lookup and expire Increment the session reference count within the lock for lookup to avoid racy issue with session expire.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*

History

13 Mar 2025, 16:22

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: corrige problema de rapidez en la búsqueda y expiración de la sesión Incrementa el recuento de referencia de sesión dentro del bloqueo para la búsqueda para evitar problemas de rapidez con la expiración de la sesión.
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CWE CWE-667
References () https://git.kernel.org/stable/c/2107ab40629aeabbec369cf34b8cf0f288c3eb1b - () https://git.kernel.org/stable/c/2107ab40629aeabbec369cf34b8cf0f288c3eb1b - Patch
References () https://git.kernel.org/stable/c/37a0e2b362b3150317fb6e2139de67b1e29ae5ff - () https://git.kernel.org/stable/c/37a0e2b362b3150317fb6e2139de67b1e29ae5ff - Patch
References () https://git.kernel.org/stable/c/450a844c045ff0895d41b05a1cbe8febd1acfcfd - () https://git.kernel.org/stable/c/450a844c045ff0895d41b05a1cbe8febd1acfcfd - Patch
References () https://git.kernel.org/stable/c/a39e31e22a535d47b14656a7d6a893c7f6cf758c - () https://git.kernel.org/stable/c/a39e31e22a535d47b14656a7d6a893c7f6cf758c - Patch
References () https://git.kernel.org/stable/c/b95629435b84b9ecc0c765995204a4d8a913ed52 - () https://git.kernel.org/stable/c/b95629435b84b9ecc0c765995204a4d8a913ed52 - Patch
References () https://www.zerodayinitiative.com/advisories/ZDI-25-100/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-100/ - Patch, Third Party Advisory

12 Mar 2025, 10:15

Type Values Removed Values Added
References
  • () https://www.zerodayinitiative.com/advisories/ZDI-25-100/ -

12 Mar 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-12 08:15

Updated : 2025-03-13 16:22


NVD link : CVE-2024-58087

Mitre link : CVE-2024-58087

CVE.ORG link : CVE-2024-58087


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking