Skip to main content

CVE-2024-35864: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35864cvecve-2024-35864
Published: Sun May 19 2024 (05/19/2024, 08:34:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:54:52 UTC

Technical Analysis

CVE-2024-35864 is a recently disclosed vulnerability in the Linux kernel affecting the SMB (Server Message Block) client implementation. Specifically, the issue arises in the smb2_is_valid_lease_break() function, where a potential Use-After-Free (UAF) condition can occur. This vulnerability is related to the handling of SMB sessions that are in the process of being torn down, identified by the status SES_EXITING. The flaw allows the kernel to access memory that has already been freed, which can lead to undefined behavior including kernel crashes or potentially arbitrary code execution in kernel context. The fix involves skipping sessions marked as SES_EXITING to prevent the UAF condition. While no known exploits are currently reported in the wild, the vulnerability affects the Linux kernel versions identified by the given commit hashes. Since the SMB protocol is widely used for file sharing and network communication, especially in enterprise environments, this vulnerability could be leveraged by an attacker with network access to the SMB client to destabilize or compromise the system. The absence of a CVSS score suggests this is a newly published issue, and its severity must be assessed based on technical characteristics and potential impact.

Potential Impact

For European organizations, the impact of CVE-2024-35864 could be significant, especially for those relying heavily on Linux-based systems for file sharing and network services using SMB. The vulnerability could allow attackers to cause denial of service by crashing the kernel or potentially escalate privileges if exploitation leads to arbitrary code execution. This could disrupt critical business operations, data availability, and integrity. Organizations in sectors such as finance, manufacturing, government, and telecommunications, which often use Linux servers and SMB for internal and external communications, could face operational interruptions or data breaches if exploited. Moreover, the vulnerability could be used as a foothold for lateral movement within networks, increasing the risk of broader compromise. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should promptly apply the available Linux kernel patches that address this vulnerability. Since the fix involves skipping sessions in SES_EXITING state to prevent UAF, upgrading to the patched kernel versions is critical. Network administrators should also consider restricting SMB client access to trusted networks only, using firewall rules and network segmentation to limit exposure. Monitoring SMB client activity for unusual session teardown behavior could help detect exploitation attempts. Additionally, organizations should ensure that their incident response and patch management processes are agile enough to respond quickly to kernel vulnerabilities. For environments where immediate patching is challenging, temporary mitigations such as disabling SMB client functionality or isolating vulnerable systems may reduce risk. Regular backups and system integrity monitoring will help mitigate the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.107Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe36e1

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:54:52 PM

Last updated: 8/14/2025, 9:10:34 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats