CVE-2024-35866Use After Free in Linux

CWE-416Use After Free35 documents8 sources
Severity
7.8HIGHNVD
OSV8.8OSV6.8
EPSS
0.0%
top 98.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 19
Latest updateSep 2

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_dump_full_key() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages7 packages

NVDlinux/linux_kernel5.166.1.132+4
Debianlinux/linux_kernel< 6.1.133-1+2
Ubuntulinux/linux_kernel< 5.15.0-144.157+1
CVEListV5linux/linux1bb56810677f26b78d57a3038054943efd334a1cd798fd98e3563027c5162259ead517057d6fa794+5
debiandebian/linux< linux 6.1.133-1 (bookworm)

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

16
OSV
linux-azure-5.15 vulnerabilities2025-09-02
OSV
linux-azure-fips vulnerabilities2025-08-22
OSV
linux-azure vulnerabilities2025-08-22
OSV
linux-raspi vulnerabilities2025-08-05
OSV
linux-xilinx-zynqmp vulnerabilities2025-07-29

📋Vendor Advisories

17
Ubuntu
Linux kernel (Azure) vulnerabilities2025-09-02
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Azure) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-08-05
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-07-29

💬Community

1
Bugzilla
CVE-2024-35866 kernel: smb: client: fix potential UAF in cifs_dump_full_key()2024-05-20