CVE-2024-35867 — Use After Free in Linux
Severity
7.8HIGHNVD
OSV8.8OSV6.8
EPSS
0.0%
top 98.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 19
Latest updateDec 16
Description
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifs_stats_proc_show()
Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
▶CVEListV5linux/linux7f48558e6489d032b1584b0cc9ac4bb11072c034 — 838ec01ea8d3deb5d123e8ed9022e8162dc3f503+7
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
21OSV▶
linux, linux-aws, linux-aws-5.4, linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux-xilinx-zynqmp vulnera↗2025-11-19