CVE-2024-46796
Linux Kernel vulnerability analysis and mitigation

Overview

In the Linux kernel, a vulnerability has been identified and resolved in the SMB client component, specifically in the smb2setpath_size() function. The vulnerability (CVE-2024-46796) involves a double put of @cfile parameter, which could lead to a use-after-free condition. This issue affects Linux kernel versions from 6.6.32 up to (excluding) 6.6.51, from 6.9 up to (excluding) 6.10.10, and various 6.11 release candidates (rc1 through rc6) (NVD).

Technical details

The vulnerability occurs when smb2compoundop() is called with a valid @cfile and returns -EINVAL. The reference of @cfile was already dropped by the previous call, but the code attempted to reuse it without obtaining a new reference. This resulted in a KASAN (Kernel Address Sanitizer) detected slab-use-after-free error in the detachifpending function. The issue was discovered during testing with fstests generic/013 against Windows Server 2022 (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 score of AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability could lead to a use-after-free condition in the Linux kernel's SMB client implementation. This type of vulnerability typically can result in system crashes, memory corruption, or potential privilege escalation. The high CVSS score indicates potential for significant impact on system confidentiality, integrity, and availability when exploited (NVD).

Mitigation and workarounds

The vulnerability has been fixed by adding a call to cifsgetwritable_path() before retrying the operation when -EINVAL is returned. The fix ensures that a new reference to @cfile is properly obtained before reuse. Users should upgrade to Linux kernel versions 6.6.51, 6.10.10, or later to receive the fix (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-gcp-5.4
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-gcp-6.8
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-extra
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management