CVE-2024-35999

5.5 MEDIUM

📋 TL;DR

A race condition vulnerability exists in the Linux kernel's SMB3 client implementation where a missing lock when accessing session channel indices could lead to data corruption or crashes. This affects systems using the SMB3 protocol for file sharing. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist in stable kernel trees
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with SMB3 client functionality enabled and in use.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, or potential data corruption in SMB sessions.

🟠

Likely Case

System instability or crashes when multiple processes access SMB shares concurrently, causing temporary service disruption.

🟢

If Mitigated

Minor performance impact or isolated process crashes if proper isolation exists.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from internet.
🏢 Internal Only: MEDIUM - Internal users with local access could potentially cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and concurrent SMB operations to trigger race condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits: 0fcf7e219448e937681216353c9a58abae6d3c2e, 60ab245292280905603bc0d3654f4cf8fceccb00, etc.)

Vendor Advisory: https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e

Restart Required: Yes

Instructions:

1. Update to latest stable kernel version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system after update.

🔧 Temporary Workarounds

Disable SMB3 client

linux

Prevent use of SMB3 protocol if not required

# Consider removing or disabling SMB client modules if not needed
# Check with: lsmod | grep cifs
# Remove: rmmod cifs

🧯 If You Can't Patch

  • Restrict local user access to systems using SMB shares
  • Implement process isolation and resource limits to contain potential crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if SMB3 is in use. Vulnerable if using affected kernel with SMB3 client active.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to include the fix commits, and check that SMB3 operations work without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • SMB client crash logs
  • System instability during file operations

Network Indicators:

  • Unusual SMB disconnections
  • Failed SMB operations

SIEM Query:

source="kernel" AND ("panic" OR "oops") AND ("smb" OR "cifs")

🔗 References

📤 Share & Export