In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifsstatsproc_write()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
{ "vanir_signatures": [ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fefd166fcb368c5fcf48238e3f7c8af829e0a72", "digest": { "length": 1467.0, "function_hash": "318792286880150637481408123722994886097" }, "deprecated": false, "id": "CVE-2024-35868-273172e4", "signature_type": "Function", "signature_version": "v1", "target": { "function": "cifs_stats_proc_write", "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf03020c56d3ed28c4942280957a007b5e9544f7", "digest": { "threshold": 0.9, "line_hashes": [ "10720526404426749670225390746006553629", "243269172511636179953073803621076471574", "94191775141341260799445397734770677978", "262770611272245056554995270494821057434" ] }, "deprecated": false, "id": "CVE-2024-35868-2c7e7617", "signature_type": "Line", "signature_version": "v1", "target": { "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b5475ce69f02ecc1b13ea23106e5b89c690429b", "digest": { "length": 1507.0, "function_hash": "190167549632427179242442167557881204454" }, "deprecated": false, "id": "CVE-2024-35868-33bb35da", "signature_type": "Function", "signature_version": "v1", "target": { "function": "cifs_stats_proc_write", "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3da25c5ac84430f89875ca7485a3828150a7e0a", "digest": { "length": 1507.0, "function_hash": "190167549632427179242442167557881204454" }, "deprecated": false, "id": "CVE-2024-35868-4d8a99bc", "signature_type": "Function", "signature_version": "v1", "target": { "function": "cifs_stats_proc_write", "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fefd166fcb368c5fcf48238e3f7c8af829e0a72", "digest": { "threshold": 0.9, "line_hashes": [ "10720526404426749670225390746006553629", "243269172511636179953073803621076471574", "94191775141341260799445397734770677978", "262770611272245056554995270494821057434" ] }, "deprecated": false, "id": "CVE-2024-35868-579ba511", "signature_type": "Line", "signature_version": "v1", "target": { "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b5475ce69f02ecc1b13ea23106e5b89c690429b", "digest": { "threshold": 0.9, "line_hashes": [ "10720526404426749670225390746006553629", "243269172511636179953073803621076471574", "94191775141341260799445397734770677978", "262770611272245056554995270494821057434" ] }, "deprecated": false, "id": "CVE-2024-35868-636d8086", "signature_type": "Line", "signature_version": "v1", "target": { "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3da25c5ac84430f89875ca7485a3828150a7e0a", "digest": { "threshold": 0.9, "line_hashes": [ "10720526404426749670225390746006553629", "243269172511636179953073803621076471574", "94191775141341260799445397734770677978", "262770611272245056554995270494821057434" ] }, "deprecated": false, "id": "CVE-2024-35868-9909b882", "signature_type": "Line", "signature_version": "v1", "target": { "file": "fs/smb/client/cifs_debug.c" } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf03020c56d3ed28c4942280957a007b5e9544f7", "digest": { "length": 1467.0, "function_hash": "318792286880150637481408123722994886097" }, "deprecated": false, "id": "CVE-2024-35868-c0f9d3f4", "signature_type": "Function", "signature_version": "v1", "target": { "function": "cifs_stats_proc_write", "file": "fs/smb/client/cifs_debug.c" } } ] }