In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifsstatsproc_write()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"digest": {
"length": 1467.0,
"function_hash": "318792286880150637481408123722994886097"
},
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fefd166fcb368c5fcf48238e3f7c8af829e0a72",
"id": "CVE-2024-35868-273172e4"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
]
},
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf03020c56d3ed28c4942280957a007b5e9544f7",
"id": "CVE-2024-35868-2c7e7617"
},
{
"digest": {
"length": 1507.0,
"function_hash": "190167549632427179242442167557881204454"
},
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b5475ce69f02ecc1b13ea23106e5b89c690429b",
"id": "CVE-2024-35868-33bb35da"
},
{
"digest": {
"length": 1507.0,
"function_hash": "190167549632427179242442167557881204454"
},
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3da25c5ac84430f89875ca7485a3828150a7e0a",
"id": "CVE-2024-35868-4d8a99bc"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
]
},
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fefd166fcb368c5fcf48238e3f7c8af829e0a72",
"id": "CVE-2024-35868-579ba511"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
]
},
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b5475ce69f02ecc1b13ea23106e5b89c690429b",
"id": "CVE-2024-35868-636d8086"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"10720526404426749670225390746006553629",
"243269172511636179953073803621076471574",
"94191775141341260799445397734770677978",
"262770611272245056554995270494821057434"
]
},
"target": {
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3da25c5ac84430f89875ca7485a3828150a7e0a",
"id": "CVE-2024-35868-9909b882"
},
{
"digest": {
"length": 1467.0,
"function_hash": "318792286880150637481408123722994886097"
},
"target": {
"function": "cifs_stats_proc_write",
"file": "fs/smb/client/cifs_debug.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cf03020c56d3ed28c4942280957a007b5e9544f7",
"id": "CVE-2024-35868-c0f9d3f4"
}
]