CVE-2024-35999

In the Linux kernel, the following vulnerability has been resolved: smb3: missing lock when picking channel Coverity spotted a place where we should have been holding the channel lock when accessing the ses channel index. Addresses-Coverity: 1582039 ("Data race condition (MISSING_LOCK)")
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*

History

04 Apr 2025, 14:32

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e - () https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e - Patch
References () https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00 - () https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00 - Patch
References () https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887 - () https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887 - Patch
References () https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729 - () https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729 - Patch
CWE CWE-667

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e - () https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e -
References () https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00 - () https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00 -
References () https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887 - () https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887 -
References () https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729 - () https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729 -

29 Oct 2024, 20:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: smb3: falta el bloqueo al seleccionar el canal. Coverity detectó un lugar donde deberíamos haber mantenido el bloqueo del canal al acceder al índice del canal ses. Direcciones-Cobertura: 1582039 ("Condición de ejecución de datos (MISSING_LOCK)")
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

20 May 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-20 10:15

Updated : 2025-04-04 14:32


NVD link : CVE-2024-35999

Mitre link : CVE-2024-35999

CVE.ORG link : CVE-2024-35999


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking