In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in isvalidoplock_break()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"264942417852621956295822884602222323088",
"38602820529609752949579107022600990345",
"321695252266859855059232962806629658791",
"17545302474957487368682552256396588809"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@494c91e1e9413b407d12166a61b84200d4d54fac",
"target": {
"file": "fs/smb/client/misc.c"
},
"id": "CVE-2024-35863-313a144a"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2764.0,
"function_hash": "141550243380100968168475913652777025239"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@494c91e1e9413b407d12166a61b84200d4d54fac",
"target": {
"file": "fs/smb/client/misc.c",
"function": "is_valid_oplock_break"
},
"id": "CVE-2024-35863-4355b19e"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"133580553754222066892440111218105864061",
"83698070732341673157075057307027494949",
"321695252266859855059232962806629658791",
"17545302474957487368682552256396588809"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a15ba88a32fa7a516aff7ffd27befed5334dff2",
"target": {
"file": "fs/smb/client/misc.c"
},
"id": "CVE-2024-35863-8e469fc0"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2764.0,
"function_hash": "141550243380100968168475913652777025239"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a15ba88a32fa7a516aff7ffd27befed5334dff2",
"target": {
"file": "fs/smb/client/misc.c",
"function": "is_valid_oplock_break"
},
"id": "CVE-2024-35863-93563eaa"
}
]