Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2hh8-gpv5-pc93

Опубликовано: 12 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix racy issue from session lookup and expire

Increment the session reference count within the lock for lookup to avoid racy issue with session expire.

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix racy issue from session lookup and expire

Increment the session reference count within the lock for lookup to avoid racy issue with session expire.

EPSS

Процентиль: 46%
0.00236
Низкий

8.1 High

CVSS3

Дефекты

CWE-667

Связанные уязвимости

CVSS3: 8.1
ubuntu
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix racy issue from session lookup and expire Increment the session reference count within the lock for lookup to avoid racy issue with session expire.

CVSS3: 8.1
redhat
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix racy issue from session lookup and expire Increment the session reference count within the lock for lookup to avoid racy issue with session expire.

CVSS3: 8.1
nvd
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix racy issue from session lookup and expire Increment the session reference count within the lock for lookup to avoid racy issue with session expire.

CVSS3: 8.1
debian
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: k ...

CVSS3: 5.5
fstec
около 1 года назад

Уязвимость функции check_session_id(), smb2_check_user_session(), smb2_sess_setup(), smb2_session_logoff(), smb3_decrypt_req(), ksmbd_session_lookup(), ksmbd_session_lookup_slowpath() и ksmbd_get_encryption_key() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 46%
0.00236
Низкий

8.1 High

CVSS3

Дефекты

CWE-667