CVE-2024-26928

Source
https://cve.org/CVERecord?id=CVE-2024-26928
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26928.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26928
Downstream
Related
Published
2024-04-28T11:28:01.529Z
Modified
2026-03-14T12:30:04.436772Z
Summary
smb: client: fix potential UAF in cifs_debug_files_proc_show()
Details

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifsdebugfilesprocshow()

Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26928.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dfe33f9abc08997e56f9bdf14fe9ac7ac0e14075
Fixed
8f8718afd446cd4ea3b62bacc3eec09f8aae85ee
Fixed
a140224bcf87eb98a87b67ff4c6826c57e47b704
Fixed
229042314602db62559ecacba127067c22ee7b88
Fixed
a65f2b56334ba4dc30bd5ee9ce5b2691b973344d
Fixed
3402faf78b2516b0af1259baff50cc8453ef0bd1
Fixed
ca545b7f0823f19db0f1148d59bc5e1a56634502

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26928.json"