APPLIED: [SRU][J][PATCH 0/1] CVE-2024-35862

Mehmet Basaran mehmet.basaran at canonical.com
Tue Apr 7 10:07:44 UTC 2026


Applied to jammy:linux master-next branch. Thanks.

-------------- next part --------------
Tim Whisonant <tim.whisonant at canonical.com> writes:

> SRU Justification:
>
> [Impact]
>
> smb: client: fix potential UAF in smb2_is_network_name_deleted()
>
> Skip sessions that are being teared down (status == SES_EXITING) to
> avoid UAF.
>
> [Fix]
>
> Questing: not affected
> Noble:    fixed separately
> Jammy:    backported from upstream
> Focal:    not affected
> Bionic:   not affected
> Xenial:   not affected
> Trusty:   won't fix
>
> [Test Plan]
>
> Compile and boot tested.
>
> [Where problems could occur]
>
> The change affects the SMB2 protocol layer of the CIFS driver
> in order to correct a potential use after free scenario. Issues
> would only affect certain portions of the SMB2 handling for CIFS.
>
> Paulo Alcantara (1):
>   smb: client: fix potential UAF in smb2_is_network_name_deleted()
>
>  fs/cifs/smb2ops.c | 2 ++
>  1 file changed, 2 insertions(+)
>
> -- 
> 2.43.0
>
>
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 873 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260407/fdaa016a/attachment.sig>


More information about the kernel-team mailing list