In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifssignalcifsdforreconnect()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"id": "CVE-2024-35861-138a457d",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"217160645055724616124538637770408408826"
],
"threshold": 0.9
},
"target": {
"file": "fs/smb/client/connect.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e0e50401cc3921c9eaf1b0e667db174519ea939f"
},
{
"id": "CVE-2024-35861-22007bc9",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "196012026966038368290333896168785588581",
"length": 888.0
},
"target": {
"file": "fs/smb/client/connect.c",
"function": "cifs_signal_cifsd_for_reconnect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e0e50401cc3921c9eaf1b0e667db174519ea939f"
},
{
"id": "CVE-2024-35861-31341081",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "196012026966038368290333896168785588581",
"length": 888.0
},
"target": {
"file": "fs/smb/client/connect.c",
"function": "cifs_signal_cifsd_for_reconnect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2cfff21732132e363b4cc275d63ea98f1af726c1"
},
{
"id": "CVE-2024-35861-84f5d728",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "196012026966038368290333896168785588581",
"length": 888.0
},
"target": {
"file": "fs/smb/client/connect.c",
"function": "cifs_signal_cifsd_for_reconnect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9a96a7ad1e8d25dc6662bc7552e0752de74a20d"
},
{
"id": "CVE-2024-35861-aaa8501a",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "285153690695517007640747709315679232981",
"length": 775.0
},
"target": {
"file": "fs/smb/client/connect.c",
"function": "cifs_signal_cifsd_for_reconnect"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8360ac8774e19b0b25f44fff84a105bb2417e4"
},
{
"id": "CVE-2024-35861-b8bd8cbb",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"217160645055724616124538637770408408826"
],
"threshold": 0.9
},
"target": {
"file": "fs/smb/client/connect.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f9a96a7ad1e8d25dc6662bc7552e0752de74a20d"
},
{
"id": "CVE-2024-35861-d07fcd4e",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"36606720535931735095005977730378349725"
],
"threshold": 0.9
},
"target": {
"file": "fs/smb/client/connect.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8360ac8774e19b0b25f44fff84a105bb2417e4"
},
{
"id": "CVE-2024-35861-ee30af3d",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"line_hashes": [
"48485850654267419535528707141190288965",
"149469477997521068967074132943135907094",
"37500838037351245178331307579209525337",
"217160645055724616124538637770408408826"
],
"threshold": 0.9
},
"target": {
"file": "fs/smb/client/connect.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2cfff21732132e363b4cc275d63ea98f1af726c1"
}
]