In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifsstatsproc_write()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fefd166fcb368c5fcf48238e3f7c8af829e0a72",
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"function_hash": "318792286880150637481408123722994886097",
"length": 1467.0
},
"signature_version": "v1",
"id": "CVE-2024-35868-273172e4",
"signature_type": "Function",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf03020c56d3ed28c4942280957a007b5e9544f7",
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2024-35868-2c7e7617",
"signature_type": "Line",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b5475ce69f02ecc1b13ea23106e5b89c690429b",
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"function_hash": "190167549632427179242442167557881204454",
"length": 1507.0
},
"signature_version": "v1",
"id": "CVE-2024-35868-33bb35da",
"signature_type": "Function",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3da25c5ac84430f89875ca7485a3828150a7e0a",
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"function_hash": "190167549632427179242442167557881204454",
"length": 1507.0
},
"signature_version": "v1",
"id": "CVE-2024-35868-4d8a99bc",
"signature_type": "Function",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fefd166fcb368c5fcf48238e3f7c8af829e0a72",
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2024-35868-579ba511",
"signature_type": "Line",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b5475ce69f02ecc1b13ea23106e5b89c690429b",
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2024-35868-636d8086",
"signature_type": "Line",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3da25c5ac84430f89875ca7485a3828150a7e0a",
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2024-35868-9909b882",
"signature_type": "Line",
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf03020c56d3ed28c4942280957a007b5e9544f7",
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"digest": {
"function_hash": "318792286880150637481408123722994886097",
"length": 1467.0
},
"signature_version": "v1",
"id": "CVE-2024-35868-c0f9d3f4",
"signature_type": "Function",
"deprecated": false
}
]