In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifssignalcifsdforreconnect()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"217160645055724616124538637770408408826"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e0e50401cc3921c9eaf1b0e667db174519ea939f",
"target": {
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-138a457d",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 888.0,
"function_hash": "196012026966038368290333896168785588581"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e0e50401cc3921c9eaf1b0e667db174519ea939f",
"target": {
"function": "cifs_signal_cifsd_for_reconnect",
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-22007bc9",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 888.0,
"function_hash": "196012026966038368290333896168785588581"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2cfff21732132e363b4cc275d63ea98f1af726c1",
"target": {
"function": "cifs_signal_cifsd_for_reconnect",
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-31341081",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 888.0,
"function_hash": "196012026966038368290333896168785588581"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9a96a7ad1e8d25dc6662bc7552e0752de74a20d",
"target": {
"function": "cifs_signal_cifsd_for_reconnect",
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-84f5d728",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 775.0,
"function_hash": "285153690695517007640747709315679232981"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8360ac8774e19b0b25f44fff84a105bb2417e4",
"target": {
"function": "cifs_signal_cifsd_for_reconnect",
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-aaa8501a",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"217160645055724616124538637770408408826"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9a96a7ad1e8d25dc6662bc7552e0752de74a20d",
"target": {
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-b8bd8cbb",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"36606720535931735095005977730378349725"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8360ac8774e19b0b25f44fff84a105bb2417e4",
"target": {
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-d07fcd4e",
"signature_version": "v1",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"217160645055724616124538637770408408826"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2cfff21732132e363b4cc275d63ea98f1af726c1",
"target": {
"file": "fs/smb/client/connect.c"
},
"id": "CVE-2024-35861-ee30af3d",
"signature_version": "v1",
"deprecated": false
}
]