CVE-2024-35863

medium

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

References

https://git.kernel.org/stable/c/69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29

https://git.kernel.org/stable/c/494c91e1e9413b407d12166a61b84200d4d54fac

https://git.kernel.org/stable/c/16d58c6a7db5050b9638669084b63fc05f951825

https://git.kernel.org/stable/c/0a15ba88a32fa7a516aff7ffd27befed5334dff2

Details

Source: Mitre, NVD

Published: 2024-05-19

Updated: 2024-05-20

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium