APPLIED: [SRU][J][PATCH 0/1] CVE-2024-35862
Mehmet Basaran
mehmet.basaran at canonical.com
Tue Apr 7 10:07:44 UTC 2026
Applied to jammy:linux master-next branch. Thanks.
-------------- next part --------------
Tim Whisonant <tim.whisonant at canonical.com> writes:
> SRU Justification:
>
> [Impact]
>
> smb: client: fix potential UAF in smb2_is_network_name_deleted()
>
> Skip sessions that are being teared down (status == SES_EXITING) to
> avoid UAF.
>
> [Fix]
>
> Questing: not affected
> Noble: fixed separately
> Jammy: backported from upstream
> Focal: not affected
> Bionic: not affected
> Xenial: not affected
> Trusty: won't fix
>
> [Test Plan]
>
> Compile and boot tested.
>
> [Where problems could occur]
>
> The change affects the SMB2 protocol layer of the CIFS driver
> in order to correct a potential use after free scenario. Issues
> would only affect certain portions of the SMB2 handling for CIFS.
>
> Paulo Alcantara (1):
> smb: client: fix potential UAF in smb2_is_network_name_deleted()
>
> fs/cifs/smb2ops.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> --
> 2.43.0
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 873 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260407/fdaa016a/attachment.sig>
More information about the kernel-team
mailing list