Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-5345

Опубликовано: 03 окт. 2023
Источник: debian
EPSS Низкий

Описание

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.5.6-1package
linuxfixed6.1.64-1bookwormpackage
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://git.kernel.org/linus/e6e43b8aa7cd3c3af686caf0c2e11819a886d705

  • https://kernel.dance/#e6e43b8aa7cd3c3af686caf0c2e11819a886d705

EPSS

Процентиль: 5%
0.00022
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 лет назад

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

CVSS3: 7.8
redhat
около 2 лет назад

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

CVSS3: 7.8
nvd
около 2 лет назад

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

CVSS3: 7.8
msrc
около 2 лет назад

Use-after-free in Linux kernel's fs/smb/client component

CVSS3: 7.8
github
около 2 лет назад

A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.

EPSS

Процентиль: 5%
0.00022
Низкий