CVE-2024-26822

In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, gid and cruid are not specified, we need to dynamically set them into the filesystem context used for automounting otherwise they'll end up reusing the values from the parent mount.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*

History

27 Mar 2025, 20:43

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 - () https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 - Patch
References () https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb - () https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb - Patch
References () https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 - () https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: configure el id, uid y cruid correctos para montajes automáticos multiusuario Cuando no se especifican uid, gid y cruid, debemos configurarlos dinámicamente en el contexto del sistema de archivos utilizado para el montaje automático, de lo contrario terminarán reutilizando los valores del montaje principal.
References () https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 - () https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 -
References () https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb - () https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb -
References () https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 - () https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 -

17 Apr 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 10:15

Updated : 2025-03-27 20:43


NVD link : CVE-2024-26822

Mitre link : CVE-2024-26822

CVE.ORG link : CVE-2024-26822


JSON object : View

Products Affected

linux

  • linux_kernel