In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2isnetworknamedeleted()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
{ "vanir_signatures": [ { "signature_type": "Function", "target": { "file": "fs/smb/client/smb2ops.c", "function": "smb2_is_network_name_deleted" }, "id": "CVE-2024-35862-39c04355", "digest": { "length": 757.0, "function_hash": "110231311992251181323837950529392316852" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d919b6ea15ffa56fbafef4a1d92f47aeda9af645", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "fs/smb/client/smb2ops.c" }, "id": "CVE-2024-35862-a34d1a0d", "digest": { "threshold": 0.9, "line_hashes": [ "83251239657262413438781181191122136390", "168377580259307180543468182725352055209", "307431108169310321373631146798744028284", "130755979908659038100409391811375322124" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9414004798d9742c1af23a1d839fe6a9503751c", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Function", "target": { "file": "fs/smb/client/smb2ops.c", "function": "smb2_is_network_name_deleted" }, "id": "CVE-2024-35862-adaf76da", "digest": { "length": 757.0, "function_hash": "110231311992251181323837950529392316852" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa582b33f94453fdeaff1e7d0aa252c505975e01", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "fs/smb/client/smb2ops.c" }, "id": "CVE-2024-35862-b46dcb6a", "digest": { "threshold": 0.9, "line_hashes": [ "41361426319483522904734861441718182527", "245997098625461161761519844372915809614", "307431108169310321373631146798744028284", "130755979908659038100409391811375322124" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d919b6ea15ffa56fbafef4a1d92f47aeda9af645", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "fs/smb/client/smb2ops.c" }, "id": "CVE-2024-35862-ba3c2951", "digest": { "threshold": 0.9, "line_hashes": [ "41361426319483522904734861441718182527", "245997098625461161761519844372915809614", "307431108169310321373631146798744028284", "130755979908659038100409391811375322124" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aa582b33f94453fdeaff1e7d0aa252c505975e01", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Function", "target": { "file": "fs/smb/client/smb2ops.c", "function": "smb2_is_network_name_deleted" }, "id": "CVE-2024-35862-c6af25f0", "digest": { "length": 757.0, "function_hash": "110231311992251181323837950529392316852" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@63981561ffd2d4987807df4126f96a11e18b0c1d", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Line", "target": { "file": "fs/smb/client/smb2ops.c" }, "id": "CVE-2024-35862-f294a32d", "digest": { "threshold": 0.9, "line_hashes": [ "41361426319483522904734861441718182527", "245997098625461161761519844372915809614", "307431108169310321373631146798744028284", "130755979908659038100409391811375322124" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@63981561ffd2d4987807df4126f96a11e18b0c1d", "deprecated": false, "signature_version": "v1" }, { "signature_type": "Function", "target": { "file": "fs/smb/client/smb2ops.c", "function": "smb2_is_network_name_deleted" }, "id": "CVE-2024-35862-fff3f521", "digest": { "length": 731.0, "function_hash": "160797607740194265940836223028227831699" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9414004798d9742c1af23a1d839fe6a9503751c", "deprecated": false, "signature_version": "v1" } ] }