NA

CVE-2024-35867

Published: 19/05/2024 Updated: 10/06/2024

Vulnerability Summary

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

Mailing Lists

Greg Kroah-Hartman wrote on Wed, May 29, 2024 at 09:23:50PM +0200: (pedantic: `if cve=$(cve_search "$id"); then` is a bit simpler/failproof) That's roughly what I had done earlier this week (handpicking the commits that could impact our users), but this doesn't address my second point as it won't catch any new CVE introduced before that tree tha ...
On Wed, May 29, 2024 at 09:53:48AM +0900, Dominique Martinet wrote: True, we don't have that yet, but with the scripts in there, it should be easy to knock this up (hint, pass the id to scripts/cve_search) if you need it The issue is, CVEs are assigned usually long _AFTER_ the stable release has happened So if you want to do this type of re ...
On Thu, May 30, 2024 at 01:45:39PM +0900, Dominique Martinet wrote: Very true, I do not claim to be a "robust" bash programmer at all :) True Yeah, but the json files have their own issues, more below Great Only you know your use cases, which is why we do not offer up any "grading" of kernel CVEs as Linux is used in so many differe ...