Skip to main content

CVE-2024-35865: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35865cvecve-2024-35865
Published: Sun May 19 2024 (05/19/2024, 08:34:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:55:04 UTC

Technical Analysis

CVE-2024-35865 is a medium-severity vulnerability identified in the Linux kernel's SMB (Server Message Block) client implementation. The issue arises from a potential Use-After-Free (UAF) condition in the function smb2_is_valid_oplock_break(). Specifically, the vulnerability occurs when the SMB client processes oplock break notifications while a session is in the process of being torn down (status == SES_EXITING). If the code does not properly skip these sessions, it may access freed memory, leading to a UAF scenario. Use-After-Free vulnerabilities can cause system instability, crashes, or potentially allow attackers to execute arbitrary code or escalate privileges if exploited. However, this particular vulnerability does not impact confidentiality or integrity directly but affects availability, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The attack vector is local, requiring low privileges and no user interaction, which means an attacker with limited access to the system could trigger this flaw. The Linux kernel is widely used across various distributions and devices, making this vulnerability relevant to a broad range of environments. The fix involves skipping sessions marked as exiting to prevent accessing freed memory, thereby eliminating the UAF condition. No known exploits are currently reported in the wild, but the presence of a UAF in a critical kernel component warrants timely patching to prevent potential exploitation.

Potential Impact

For European organizations, the impact of CVE-2024-35865 primarily concerns system availability and stability. Linux servers and endpoints that utilize SMB client functionality could experience crashes or denial of service if this vulnerability is exploited. This could disrupt business operations, especially in environments relying on SMB for file sharing or network communication. Although the vulnerability does not directly compromise data confidentiality or integrity, the resulting service interruptions could affect critical infrastructure, cloud services, and enterprise applications running on Linux. Organizations in sectors such as finance, manufacturing, telecommunications, and government, which heavily depend on Linux-based systems, may face operational risks. Additionally, the requirement for local access and low privileges means that insider threats or compromised user accounts could leverage this vulnerability to cause disruptions. Given the widespread use of Linux in European data centers and cloud environments, unpatched systems could become targets for attackers aiming to degrade service availability or cause instability.

Mitigation Recommendations

To mitigate CVE-2024-35865, European organizations should prioritize applying the official Linux kernel patches that address the UAF condition in the SMB client code. System administrators must verify that their Linux distributions have incorporated the fix and update kernel versions accordingly. Beyond patching, organizations should implement strict access controls to limit local user privileges, reducing the risk of exploitation by low-privileged users. Monitoring and auditing SMB client activity can help detect anomalous behavior indicative of exploitation attempts. Employing kernel hardening techniques, such as enabling Kernel Address Space Layout Randomization (KASLR) and Kernel Page-Table Isolation (KPTI), can further reduce the impact of memory corruption vulnerabilities. For environments where immediate patching is not feasible, temporarily disabling SMB client functionality or restricting SMB traffic via firewall rules may reduce exposure. Finally, maintaining robust endpoint security and user behavior monitoring will help identify and respond to potential exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.107Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe36e5

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:55:04 PM

Last updated: 7/28/2025, 3:57:31 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats