smb: client: fix potential UAF in cifs_debug_files_proc_show()
Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4178-1 | linux security update |
Ubuntu USN |
USN-6893-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6893-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6893-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6918-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7406-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7406-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7406-3 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7406-4 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7406-5 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-7406-6 | Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
Ubuntu USN |
USN-7407-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-7408-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7408-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7408-3 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7408-4 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-7420-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7421-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7458-1 | Linux kernel (IBM) vulnerabilities |
Ubuntu USN |
USN-7459-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-7459-2 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-7462-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7462-2 | Linux kernel (AWS FIPS) vulnerabilities |
Ubuntu USN |
USN-7463-1 | Linux kernel (IBM) vulnerabilities |
Ubuntu USN |
USN-7475-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-7539-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7540-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 02 May 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 10 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 07 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
|
| Vendors & Products |
Linux
Linux linux Kernel |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 13 Nov 2024 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-11-03T19:29:37.367Z
Reserved: 2024-02-19T14:20:24.195Z
Link: CVE-2024-26928
Updated: 2025-11-03T19:29:37.367Z
Status : Modified
Published: 2024-04-28T12:15:21.140
Modified: 2025-11-03T20:16:11.257
Link: CVE-2024-26928
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN