THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-26928

smb: client: fix potential UAF in cifs_debug_files_proc_show()

AssignerLinux
Reserved2024-02-19
Published2024-04-28
Updated2024-07-05

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

Product status

Default status
unaffected

1da177e4c3f4 before 229042314602
affected

1da177e4c3f4 before a65f2b56334b
affected

1da177e4c3f4 before 3402faf78b25
affected

1da177e4c3f4 before ca545b7f0823
affected

Default status
affected

6.1.85
unaffected

6.6.26
unaffected

6.8.5
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/229042314602db62559ecacba127067c22ee7b88

https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d

https://git.kernel.org/stable/c/3402faf78b2516b0af1259baff50cc8453ef0bd1

https://git.kernel.org/stable/c/ca545b7f0823f19db0f1148d59bc5e1a56634502

cve.org CVE-2024-26928

nvd.nist.gov CVE-2024-26928

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26928
© Copyright 2024 THREATINT. Made in Cyprus with +