In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2isvalidoplockbreak()
Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
[
{
"id": "CVE-2024-35865-0e417f1f",
"signature_version": "v1",
"digest": {
"function_hash": "64334390053030786032059508034013010767",
"length": 1895.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dba0e5276f131e36d6d8043191d856f49238628",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
}
},
{
"id": "CVE-2024-35865-13105728",
"signature_version": "v1",
"digest": {
"function_hash": "64334390053030786032059508034013010767",
"length": 1895.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84488466b7a69570bdbf76dd9576847ab97d54e7",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
}
},
{
"id": "CVE-2024-35865-5f9d55de",
"signature_version": "v1",
"digest": {
"function_hash": "64334390053030786032059508034013010767",
"length": 1895.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22863485a4626ec6ecf297f4cc0aef709bc862e4",
"target": {
"file": "fs/smb/client/smb2misc.c",
"function": "smb2_is_valid_oplock_break"
}
},
{
"id": "CVE-2024-35865-b4f8db12",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"335378976741759184596723682282793589822",
"245997098625461161761519844372915809614",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22863485a4626ec6ecf297f4cc0aef709bc862e4",
"target": {
"file": "fs/smb/client/smb2misc.c"
}
},
{
"id": "CVE-2024-35865-b94d144b",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"335378976741759184596723682282793589822",
"245997098625461161761519844372915809614",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dba0e5276f131e36d6d8043191d856f49238628",
"target": {
"file": "fs/smb/client/smb2misc.c"
}
},
{
"id": "CVE-2024-35865-eed8f902",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"83566185647615350534453016341492501119",
"168377580259307180543468182725352055209",
"301147941417827664997694115707317261846",
"235203722144978264587316605692113851878"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84488466b7a69570bdbf76dd9576847ab97d54e7",
"target": {
"file": "fs/smb/client/smb2misc.c"
}
}
]