CVE-2024-35863

Updated: 2024-12-31 00:03:17.793678

Description:

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Needs Triage 2024-11-13 06:39:47
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Ignored 2024-11-14 04:33:43
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-01-10 22:41:00
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-01-10 22:40:59
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1738663576 2025-02-05 02:56:48
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1738663660 2025-02-05 02:56:49
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1738592614 2025-02-04 02:17:23
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-01-10 22:41:00
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-01-10 22:40:59
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-01-10 22:40:59
Total: 14