CVE-2024-35863
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's SMB client implementation. An attacker could potentially exploit this to crash the kernel or execute arbitrary code with kernel privileges. Systems running vulnerable Linux kernel versions with SMB client functionality are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or arbitrary code execution with kernel privileges, potentially resulting in full system compromise.
Likely Case
Kernel panic causing system instability or denial of service, requiring reboot to restore functionality.
If Mitigated
Limited impact if exploit fails or system has additional security controls like kernel hardening features.
🎯 Exploit Status
Exploitation requires ability to trigger SMB oplock break operations against a vulnerable client, typically requiring network access to the target.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 0a15ba88a32fa7a516aff7ffd27befed5334dff2, 16d58c6a7db5050b9638669084b63fc05f951825, 494c91e1e9413b407d12166a61b84200d4d54fac, 69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29
Vendor Advisory: https://git.kernel.org/stable/c/0a15ba88a32fa7a516aff7ffd27befed5334dff2
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SMB client functionality
linuxRemove or disable SMB/CIFS client modules if not required
modprobe -r cifs
echo 'blacklist cifs' >> /etc/modprobe.d/blacklist.conf
Restrict SMB network access
linuxUse firewall rules to limit SMB connections to trusted servers only
iptables -A OUTPUT -p tcp --dport 445 -j DROP
iptables -A OUTPUT -p tcp --dport 139 -j DROP
🧯 If You Can't Patch
- Implement network segmentation to isolate SMB client systems from untrusted networks
- Monitor for unusual SMB client behavior or kernel crashes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with patched versions from kernel git commits. Examine if cifs module is loaded: lsmod | grep cifs
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched versions. Check that system remains stable during SMB operations.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/messages or dmesg
- UAF (use-after-free) kernel warnings
- SMB client connection errors
Network Indicators:
- Unusual SMB traffic patterns to/from client systems
- Multiple SMB oplock break requests
SIEM Query:
source="kernel" AND ("panic" OR "UAF" OR "use-after-free") AND "cifs"
🔗 References
- https://git.kernel.org/stable/c/0a15ba88a32fa7a516aff7ffd27befed5334dff2
- https://git.kernel.org/stable/c/16d58c6a7db5050b9638669084b63fc05f951825
- https://git.kernel.org/stable/c/494c91e1e9413b407d12166a61b84200d4d54fac
- https://git.kernel.org/stable/c/69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29
- https://git.kernel.org/stable/c/0a15ba88a32fa7a516aff7ffd27befed5334dff2
- https://git.kernel.org/stable/c/16d58c6a7db5050b9638669084b63fc05f951825
- https://git.kernel.org/stable/c/494c91e1e9413b407d12166a61b84200d4d54fac
- https://git.kernel.org/stable/c/69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29