Skip to main content

CVE-2024-35867: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35867cvecve-2024-35867
Published: Sun May 19 2024 (05/19/2024, 08:34:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_stats_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:55:28 UTC

Technical Analysis

CVE-2024-35867 is a recently disclosed vulnerability in the Linux kernel affecting the SMB (Server Message Block) client implementation, specifically within the cifs_stats_proc_show() function. The vulnerability is a potential Use-After-Free (UAF) condition that arises when the code attempts to access session data that is in the process of being torn down (marked with status SES_EXITING). This improper handling can lead to dereferencing freed memory, which may cause kernel crashes or potentially allow an attacker to execute arbitrary code with kernel privileges. The vulnerability is rooted in the SMB client code that handles statistics reporting via the CIFS (Common Internet File System) protocol, which is widely used for file sharing in mixed Windows/Linux environments. The fix involves skipping sessions that are in the SES_EXITING state to prevent accessing invalid memory. While no exploits have been reported in the wild yet, the nature of the vulnerability—kernel-level UAF—makes it a serious concern because exploitation could lead to privilege escalation or denial of service. The affected versions are identified by specific commit hashes, indicating that the vulnerability is present in certain recent Linux kernel builds prior to the patch. No CVSS score has been assigned yet, but the vulnerability has been published and enriched by CISA, highlighting its significance.

Potential Impact

For European organizations, the impact of CVE-2024-35867 could be substantial, especially for enterprises and service providers relying on Linux servers for SMB/CIFS file sharing services. Exploitation could lead to kernel crashes causing denial of service, disrupting critical business operations and potentially leading to data unavailability. More critically, a successful exploit could allow attackers to escalate privileges to kernel level, compromising the confidentiality and integrity of sensitive data and systems. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where Linux servers are prevalent and SMB shares are commonly used for file exchange. The vulnerability could also be leveraged in targeted attacks or lateral movement within networks, increasing the risk of broader compromise. Given the widespread use of Linux in European data centers and cloud environments, unpatched systems could be vulnerable to exploitation once proof-of-concept or weaponized exploits become available.

Mitigation Recommendations

Organizations should prioritize applying the official Linux kernel patches that address this vulnerability as soon as they become available. Since the vulnerability is in the SMB client code, administrators should audit and monitor SMB/CIFS usage on Linux servers, limiting SMB client functionality where not needed. Employing strict network segmentation and firewall rules to restrict SMB traffic can reduce exposure. Additionally, monitoring kernel logs and system behavior for anomalies related to CIFS operations can help detect exploitation attempts. For environments where immediate patching is not feasible, temporarily disabling SMB client features or restricting access to SMB shares may mitigate risk. It is also advisable to maintain up-to-date backups and implement robust incident response plans to quickly recover from potential exploitation. Finally, organizations should stay informed through vendor advisories and threat intelligence feeds for any emerging exploit developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.107Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe36ed

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:55:28 PM

Last updated: 8/11/2025, 8:48:53 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats