In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2isvalidoplockbreak()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"id": "CVE-2024-35865-0e417f1f",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
},
"deprecated": false,
"digest": {
"length": 1895.0,
"function_hash": "64334390053030786032059508034013010767"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dba0e5276f131e36d6d8043191d856f49238628"
},
{
"id": "CVE-2024-35865-13105728",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
},
"deprecated": false,
"digest": {
"length": 1895.0,
"function_hash": "64334390053030786032059508034013010767"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84488466b7a69570bdbf76dd9576847ab97d54e7"
},
{
"id": "CVE-2024-35865-27f1becf",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
},
"deprecated": false,
"digest": {
"length": 1895.0,
"function_hash": "64334390053030786032059508034013010767"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21fed37d2bdcde33453faf61d3d4d96c355f04bd"
},
{
"id": "CVE-2024-35865-5f9d55de",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
},
"deprecated": false,
"digest": {
"length": 1895.0,
"function_hash": "64334390053030786032059508034013010767"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22863485a4626ec6ecf297f4cc0aef709bc862e4"
},
{
"id": "CVE-2024-35865-b4f8db12",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2misc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"335378976741759184596723682282793589822",
"245997098625461161761519844372915809614",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22863485a4626ec6ecf297f4cc0aef709bc862e4"
},
{
"id": "CVE-2024-35865-b94d144b",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2misc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"335378976741759184596723682282793589822",
"245997098625461161761519844372915809614",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dba0e5276f131e36d6d8043191d856f49238628"
},
{
"id": "CVE-2024-35865-cfb42a07",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2misc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"335378976741759184596723682282793589822",
"245997098625461161761519844372915809614",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21fed37d2bdcde33453faf61d3d4d96c355f04bd"
},
{
"id": "CVE-2024-35865-eed8f902",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "fs/smb/client/smb2misc.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"83566185647615350534453016341492501119",
"168377580259307180543468182725352055209",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84488466b7a69570bdbf76dd9576847ab97d54e7"
}
]