CVE-2024-35861
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's SMB client implementation. Attackers could potentially exploit this to crash the kernel or execute arbitrary code with kernel privileges. Systems running vulnerable Linux kernel versions with SMB client functionality are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or potential arbitrary code execution with kernel privileges, resulting in complete system compromise.
Likely Case
Kernel panic causing system instability or denial of service, requiring system reboot.
If Mitigated
System remains stable with no impact if the vulnerable code path isn't triggered during session teardown.
🎯 Exploit Status
Exploitation requires triggering the vulnerable code path during SMB session cleanup, which may be difficult to achieve reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific kernel versions from provided git commit references
Vendor Advisory: https://git.kernel.org/stable/c/2cfff21732132e363b4cc275d63ea98f1af726c1
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SMB client module
linuxPrevent loading of the vulnerable cifs/smb client kernel module
echo 'blacklist cifs' >> /etc/modprobe.d/blacklist.conf
rmmod cifs
Restrict SMB client usage
linuxPrevent systems from initiating SMB client connections
🧯 If You Can't Patch
- Isolate systems from untrusted SMB servers
- Implement strict network segmentation for SMB traffic
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare against patched versions from git commits. Check if cifs module is loaded: lsmod | grep cifs
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to patched version. Confirm cifs module version if possible.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Oops messages in dmesg
- System crashes during SMB operations
Network Indicators:
- Unusual SMB client connection patterns
- Multiple failed SMB session establishments
SIEM Query:
source="kernel" AND ("panic" OR "Oops") AND ("cifs" OR "SMB")
🔗 References
- https://git.kernel.org/stable/c/2cfff21732132e363b4cc275d63ea98f1af726c1
- https://git.kernel.org/stable/c/7e8360ac8774e19b0b25f44fff84a105bb2417e4
- https://git.kernel.org/stable/c/e0e50401cc3921c9eaf1b0e667db174519ea939f
- https://git.kernel.org/stable/c/f9a96a7ad1e8d25dc6662bc7552e0752de74a20d
- https://git.kernel.org/stable/c/2cfff21732132e363b4cc275d63ea98f1af726c1
- https://git.kernel.org/stable/c/7e8360ac8774e19b0b25f44fff84a105bb2417e4
- https://git.kernel.org/stable/c/e0e50401cc3921c9eaf1b0e667db174519ea939f
- https://git.kernel.org/stable/c/f9a96a7ad1e8d25dc6662bc7552e0752de74a20d