CVE-2024-26928
Published: May 1, 2024Last modified: May 1, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.8 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.89-r0) |
| 25 LTS | linux-lts | Fixed (6.12.41-r0) | |
| Stream | linux-lts | Fixed (6.12.41-r0) |
References
- https://git.kernel.org/stable/c/229042314602db62559ecacba127067c22ee7b88
- https://git.kernel.org/stable/c/3402faf78b2516b0af1259baff50cc8453ef0bd1
- https://git.kernel.org/stable/c/8f8718afd446cd4ea3b62bacc3eec09f8aae85ee
- https://git.kernel.org/stable/c/a140224bcf87eb98a87b67ff4c6826c57e47b704
- https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d
- https://git.kernel.org/stable/c/ca545b7f0823f19db0f1148d59bc5e1a56634502
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html