CVE-2024-35867

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

02 May 2025, 07:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/838ec01ea8d3deb5d123e8ed9022e8162dc3f503 -
  • () https://git.kernel.org/stable/c/bb6570085826291dc392005f9fec16ea5da3c8ad -

30 Dec 2024, 17:36

Type Values Removed Values Added
CWE CWE-416
References () https://git.kernel.org/stable/c/0865ffefea197b437ba78b5dd8d8e256253efd65 - () https://git.kernel.org/stable/c/0865ffefea197b437ba78b5dd8d8e256253efd65 - Patch
References () https://git.kernel.org/stable/c/16b7d785775eb03929766819415055e367398f49 - () https://git.kernel.org/stable/c/16b7d785775eb03929766819415055e367398f49 - Patch
References () https://git.kernel.org/stable/c/1e12f0d5c66f07c934041621351973a116fa13c7 - () https://git.kernel.org/stable/c/1e12f0d5c66f07c934041621351973a116fa13c7 - Patch
References () https://git.kernel.org/stable/c/c3cf8b74c57924c0985e49a1fdf02d3395111f39 - () https://git.kernel.org/stable/c/c3cf8b74c57924c0985e49a1fdf02d3395111f39 - Patch
References () http://www.openwall.com/lists/oss-security/2024/05/29/2 - () http://www.openwall.com/lists/oss-security/2024/05/29/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/05/30/1 - () http://www.openwall.com/lists/oss-security/2024/05/30/1 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/05/30/2 - () http://www.openwall.com/lists/oss-security/2024/05/30/2 - Mailing List
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/29/2 -
  • () http://www.openwall.com/lists/oss-security/2024/05/30/1 -
  • () http://www.openwall.com/lists/oss-security/2024/05/30/2 -
References () https://git.kernel.org/stable/c/0865ffefea197b437ba78b5dd8d8e256253efd65 - () https://git.kernel.org/stable/c/0865ffefea197b437ba78b5dd8d8e256253efd65 -
References () https://git.kernel.org/stable/c/16b7d785775eb03929766819415055e367398f49 - () https://git.kernel.org/stable/c/16b7d785775eb03929766819415055e367398f49 -
References () https://git.kernel.org/stable/c/1e12f0d5c66f07c934041621351973a116fa13c7 - () https://git.kernel.org/stable/c/1e12f0d5c66f07c934041621351973a116fa13c7 -
References () https://git.kernel.org/stable/c/c3cf8b74c57924c0985e49a1fdf02d3395111f39 - () https://git.kernel.org/stable/c/c3cf8b74c57924c0985e49a1fdf02d3395111f39 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/05/29/2', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/05/30/1', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/05/30/2', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/29/2 -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/30/1 -
  • () http://www.openwall.com/lists/oss-security/2024/05/30/2 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: corrige UAF potencial en cifs_stats_proc_show() Omita las sesiones que se están eliminando (estado == SES_EXITING) para evitar UAF.

19 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 09:15

Updated : 2025-05-02 07:15


NVD link : CVE-2024-35867

Mitre link : CVE-2024-35867

CVE.ORG link : CVE-2024-35867


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free