In the Linux kernel, the following vulnerability has been resolved:
smb: client: guarantee refcounted children from parent session
Avoid potential use-after-free bugs when walking DFS referrals,
mounting and performing DFS failover by ensuring that all children
from parent @tcon->ses are also refcounted. They're all needed across
the entire DFS mount. Get rid of @tcon->dfs_ses_list while we're at
it, too.
References
Configurations
No configuration.
History
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/062a7f0ff46eb57aff526897bd2bebfdb1d3046a - | |
References | () https://git.kernel.org/stable/c/645f332c6b63499cc76197f9b6bffcc659ba64cc - | |
References | () https://git.kernel.org/stable/c/e1db9ae87b7148c021daee1fcc4bc71b2ac58a79 - |
03 Jul 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
CWE | CWE-416 | |
Summary |
|
19 May 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-19 09:15
Updated : 2024-11-21 09:21
NVD link : CVE-2024-35869
Mitre link : CVE-2024-35869
CVE.ORG link : CVE-2024-35869
JSON object : View
Products Affected
No product.
CWE
CWE-416
Use After Free