CVE-2024-35865
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's SMB client could allow an attacker to crash the system or potentially execute arbitrary code. This affects Linux systems using the SMB client when processing oplock break notifications. Attackers could exploit this by sending malicious SMB packets to trigger the vulnerability.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or potential privilege escalation to kernel-level code execution, resulting in complete system compromise.
Likely Case
Kernel panic causing system crash and denial of service, requiring system reboot to restore functionality.
If Mitigated
System crash requiring reboot but no data loss or privilege escalation if proper isolation and monitoring are in place.
🎯 Exploit Status
Exploitation requires ability to send SMB packets to trigger oplock break handling during session teardown.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees via provided git commits
Vendor Advisory: https://git.kernel.org/stable/c/21fed37d2bdcde33453faf61d3d4d96c355f04bd
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SMB client
linuxPrevent use of SMB client functionality if not required
# Consider removing SMB/CIFS modules if not needed
# lsmod | grep cifs
# modprobe -r cifs
Network segmentation
linuxRestrict SMB traffic to trusted sources only
# iptables -A INPUT -p tcp --dport 445 -j DROP
# iptables -A INPUT -p tcp --dport 139 -j DROP
🧯 If You Can't Patch
- Implement strict network controls to block SMB traffic from untrusted sources
- Monitor systems for kernel panics or unexpected reboots and investigate SMB-related crashes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's security advisories. Vulnerable if using unpatched kernel with SMB client enabled.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version matches patched version from vendor advisory and system remains stable during SMB operations.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/messages or dmesg
- Unexpected system reboots
- SMB-related error messages
Network Indicators:
- Unusual SMB traffic patterns
- Multiple SMB session establishment/teardown attempts
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "general protection fault") AND ("smb" OR "cifs" OR "SMB")
🔗 References
- https://git.kernel.org/stable/c/21fed37d2bdcde33453faf61d3d4d96c355f04bd
- https://git.kernel.org/stable/c/22863485a4626ec6ecf297f4cc0aef709bc862e4
- https://git.kernel.org/stable/c/3dba0e5276f131e36d6d8043191d856f49238628
- https://git.kernel.org/stable/c/84488466b7a69570bdbf76dd9576847ab97d54e7
- https://git.kernel.org/stable/c/21fed37d2bdcde33453faf61d3d4d96c355f04bd
- https://git.kernel.org/stable/c/22863485a4626ec6ecf297f4cc0aef709bc862e4
- https://git.kernel.org/stable/c/3dba0e5276f131e36d6d8043191d856f49238628
- https://git.kernel.org/stable/c/84488466b7a69570bdbf76dd9576847ab97d54e7