In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2isnetworknamedeleted()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"deprecated": false,
"id": "CVE-2024-35862-39c04355",
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d919b6ea15ffa56fbafef4a1d92f47aeda9af645",
"target": {
"file": "fs/smb/client/smb2ops.c",
"function": "smb2_is_network_name_deleted"
},
"digest": {
"function_hash": "110231311992251181323837950529392316852",
"length": 757.0
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-a34d1a0d",
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9414004798d9742c1af23a1d839fe6a9503751c",
"target": {
"file": "fs/smb/client/smb2ops.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"83251239657262413438781181191122136390",
"168377580259307180543468182725352055209",
"307431108169310321373631146798744028284",
"130755979908659038100409391811375322124"
]
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-adaf76da",
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa582b33f94453fdeaff1e7d0aa252c505975e01",
"target": {
"file": "fs/smb/client/smb2ops.c",
"function": "smb2_is_network_name_deleted"
},
"digest": {
"function_hash": "110231311992251181323837950529392316852",
"length": 757.0
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-b46dcb6a",
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d919b6ea15ffa56fbafef4a1d92f47aeda9af645",
"target": {
"file": "fs/smb/client/smb2ops.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"41361426319483522904734861441718182527",
"245997098625461161761519844372915809614",
"307431108169310321373631146798744028284",
"130755979908659038100409391811375322124"
]
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-ba3c2951",
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa582b33f94453fdeaff1e7d0aa252c505975e01",
"target": {
"file": "fs/smb/client/smb2ops.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"41361426319483522904734861441718182527",
"245997098625461161761519844372915809614",
"307431108169310321373631146798744028284",
"130755979908659038100409391811375322124"
]
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-c6af25f0",
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@63981561ffd2d4987807df4126f96a11e18b0c1d",
"target": {
"file": "fs/smb/client/smb2ops.c",
"function": "smb2_is_network_name_deleted"
},
"digest": {
"function_hash": "110231311992251181323837950529392316852",
"length": 757.0
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-f294a32d",
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@63981561ffd2d4987807df4126f96a11e18b0c1d",
"target": {
"file": "fs/smb/client/smb2ops.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"41361426319483522904734861441718182527",
"245997098625461161761519844372915809614",
"307431108169310321373631146798744028284",
"130755979908659038100409391811375322124"
]
}
},
{
"deprecated": false,
"id": "CVE-2024-35862-fff3f521",
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9414004798d9742c1af23a1d839fe6a9503751c",
"target": {
"file": "fs/smb/client/smb2ops.c",
"function": "smb2_is_network_name_deleted"
},
"digest": {
"function_hash": "160797607740194265940836223028227831699",
"length": 731.0
}
}
]