SB2024053176 - Use-after-free in Linux kernel smb client
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2024-35870)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the cifs_mark_tcp_ses_conns_for_reconnect() and cifs_find_smb_ses() functions in fs/smb/client/connect.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/6202996a1c1887e83d0b3b0fcd86d0e5e6910ea0
- https://git.kernel.org/stable/c/45f2beda1f1bc3d962ec07db1ccc3197c25499a5
- https://git.kernel.org/stable/c/24a9799aa8efecd0eb55a75e35f9d8e6400063aa
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.121
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.29
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.5