CVE-2024-53179
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/12/2024
Last modified:
10/02/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
smb: client: fix use-after-free of signing key<br />
<br />
Customers have reported use-after-free in @ses->auth_key.response with<br />
SMB2.1 + sign mounts which occurs due to following race:<br />
<br />
task A task B<br />
cifs_mount()<br />
dfs_mount_share()<br />
get_session()<br />
cifs_mount_get_session() cifs_send_recv()<br />
cifs_get_smb_ses() compound_send_recv()<br />
cifs_setup_session() smb2_setup_request()<br />
kfree_sensitive() smb2_calc_signature()<br />
crypto_shash_setkey() *UAF*<br />
<br />
Fix this by ensuring that we have a valid @ses->auth_key.response by<br />
checking whether @ses->ses_status is SES_GOOD or SES_EXITING with<br />
@ses->ses_lock held. After commit 24a9799aa8ef ("smb: client: fix UAF<br />
in smb2_reconnect_server()"), we made sure to call ->logoff() only<br />
when @ses was known to be good (e.g. valid ->auth_key.response), so<br />
it&#39;s safe to access signing key when @ses->ses_status == SES_EXITING.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.70 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



