In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2isvalidoplockbreak()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dba0e5276f131e36d6d8043191d856f49238628", "signature_version": "v1", "target": { "function": "smb2_is_valid_oplock_break", "file": "fs/smb/client/smb2misc.c" }, "digest": { "function_hash": "64334390053030786032059508034013010767", "length": 1895.0 }, "id": "CVE-2024-35865-0e417f1f" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84488466b7a69570bdbf76dd9576847ab97d54e7", "signature_version": "v1", "target": { "function": "smb2_is_valid_oplock_break", "file": "fs/smb/client/smb2misc.c" }, "digest": { "function_hash": "64334390053030786032059508034013010767", "length": 1895.0 }, "id": "CVE-2024-35865-13105728" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21fed37d2bdcde33453faf61d3d4d96c355f04bd", "signature_version": "v1", "target": { "function": "smb2_is_valid_oplock_break", "file": "fs/smb/client/smb2misc.c" }, "digest": { "function_hash": "64334390053030786032059508034013010767", "length": 1895.0 }, "id": "CVE-2024-35865-27f1becf" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22863485a4626ec6ecf297f4cc0aef709bc862e4", "signature_version": "v1", "target": { "function": "smb2_is_valid_oplock_break", "file": "fs/smb/client/smb2misc.c" }, "digest": { "function_hash": "64334390053030786032059508034013010767", "length": 1895.0 }, "id": "CVE-2024-35865-5f9d55de" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22863485a4626ec6ecf297f4cc0aef709bc862e4", "signature_version": "v1", "target": { "file": "fs/smb/client/smb2misc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "335378976741759184596723682282793589822", "245997098625461161761519844372915809614", "301147941417827664997694115707317261846", "235203722144978264587316605692113851878" ] }, "id": "CVE-2024-35865-b4f8db12" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dba0e5276f131e36d6d8043191d856f49238628", "signature_version": "v1", "target": { "file": "fs/smb/client/smb2misc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "335378976741759184596723682282793589822", "245997098625461161761519844372915809614", "301147941417827664997694115707317261846", "235203722144978264587316605692113851878" ] }, "id": "CVE-2024-35865-b94d144b" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@21fed37d2bdcde33453faf61d3d4d96c355f04bd", "signature_version": "v1", "target": { "file": "fs/smb/client/smb2misc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "335378976741759184596723682282793589822", "245997098625461161761519844372915809614", "301147941417827664997694115707317261846", "235203722144978264587316605692113851878" ] }, "id": "CVE-2024-35865-cfb42a07" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84488466b7a69570bdbf76dd9576847ab97d54e7", "signature_version": "v1", "target": { "file": "fs/smb/client/smb2misc.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "83566185647615350534453016341492501119", "168377580259307180543468182725352055209", "301147941417827664997694115707317261846", "235203722144978264587316605692113851878" ] }, "id": "CVE-2024-35865-eed8f902" } ]