In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifs_stats_proc_write()
Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
References
Configurations
Configuration 1 (hide)
|
History
30 Dec 2024, 17:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/5b5475ce69f02ecc1b13ea23106e5b89c690429b - Patch | |
References | () https://git.kernel.org/stable/c/8fefd166fcb368c5fcf48238e3f7c8af829e0a72 - Patch | |
References | () https://git.kernel.org/stable/c/cf03020c56d3ed28c4942280957a007b5e9544f7 - Patch | |
References | () https://git.kernel.org/stable/c/d3da25c5ac84430f89875ca7485a3828150a7e0a - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Information
Published : 2024-05-19 09:15
Updated : 2024-12-30 17:37
NVD link : CVE-2024-35868
Mitre link : CVE-2024-35868
CVE.ORG link : CVE-2024-35868
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free