In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in isvalidoplock_break()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"signature_type": "Function",
"id": "CVE-2024-35863-177a98de",
"target": {
"file": "fs/smb/client/misc.c",
"function": "is_valid_oplock_break"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16d58c6a7db5050b9638669084b63fc05f951825",
"signature_version": "v1",
"digest": {
"function_hash": "141550243380100968168475913652777025239",
"length": 2764.0
},
"deprecated": false
},
{
"signature_type": "Line",
"id": "CVE-2024-35863-313a144a",
"target": {
"file": "fs/smb/client/misc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@494c91e1e9413b407d12166a61b84200d4d54fac",
"signature_version": "v1",
"digest": {
"line_hashes": [
"264942417852621956295822884602222323088",
"38602820529609752949579107022600990345",
"321695252266859855059232962806629658791",
"17545302474957487368682552256396588809"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_type": "Function",
"id": "CVE-2024-35863-4355b19e",
"target": {
"file": "fs/smb/client/misc.c",
"function": "is_valid_oplock_break"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@494c91e1e9413b407d12166a61b84200d4d54fac",
"signature_version": "v1",
"digest": {
"function_hash": "141550243380100968168475913652777025239",
"length": 2764.0
},
"deprecated": false
},
{
"signature_type": "Function",
"id": "CVE-2024-35863-4cbcdbf1",
"target": {
"file": "fs/smb/client/misc.c",
"function": "is_valid_oplock_break"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29",
"signature_version": "v1",
"digest": {
"function_hash": "141550243380100968168475913652777025239",
"length": 2764.0
},
"deprecated": false
},
{
"signature_type": "Line",
"id": "CVE-2024-35863-571fd02f",
"target": {
"file": "fs/smb/client/misc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16d58c6a7db5050b9638669084b63fc05f951825",
"signature_version": "v1",
"digest": {
"line_hashes": [
"133580553754222066892440111218105864061",
"83698070732341673157075057307027494949",
"321695252266859855059232962806629658791",
"17545302474957487368682552256396588809"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_type": "Line",
"id": "CVE-2024-35863-8e469fc0",
"target": {
"file": "fs/smb/client/misc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a15ba88a32fa7a516aff7ffd27befed5334dff2",
"signature_version": "v1",
"digest": {
"line_hashes": [
"133580553754222066892440111218105864061",
"83698070732341673157075057307027494949",
"321695252266859855059232962806629658791",
"17545302474957487368682552256396588809"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_type": "Function",
"id": "CVE-2024-35863-93563eaa",
"target": {
"file": "fs/smb/client/misc.c",
"function": "is_valid_oplock_break"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a15ba88a32fa7a516aff7ffd27befed5334dff2",
"signature_version": "v1",
"digest": {
"function_hash": "141550243380100968168475913652777025239",
"length": 2764.0
},
"deprecated": false
},
{
"signature_type": "Line",
"id": "CVE-2024-35863-b4fe62ae",
"target": {
"file": "fs/smb/client/misc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29",
"signature_version": "v1",
"digest": {
"line_hashes": [
"133580553754222066892440111218105864061",
"83698070732341673157075057307027494949",
"321695252266859855059232962806629658791",
"17545302474957487368682552256396588809"
],
"threshold": 0.9
},
"deprecated": false
}
]