CVE-2024-26822

In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, gid and cruid are not specified, we need to dynamically set them into the filesystem context used for automounting otherwise they'll end up reusing the values from the parent mount.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*

History

27 Mar 2025, 20:43

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 - () https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 - Patch
References () https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb - () https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb - Patch
References () https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 - () https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.15.124:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1.54:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Information

Published : 2024-04-17 10:15

Updated : 2025-03-27 20:43


NVD link : CVE-2024-26822

Mitre link : CVE-2024-26822

CVE.ORG link : CVE-2024-26822


JSON object : View

Products Affected

linux

  • linux_kernel