Описание
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix possible memory leak in smb2_lock()
argv needs to be free when setup_async_work fails or when the current process is woken up.
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix possible memory leak in smb2_lock()
argv needs to be free when setup_async_work fails or when the current process is woken up.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-54162
- https://git.kernel.org/stable/c/11d38f8a0c19763e34d2093b5ecb640e012cb2d2
- https://git.kernel.org/stable/c/6bf555ed8938444466c3d7f3252eb874a518f293
- https://git.kernel.org/stable/c/bfe8372ef2dbdce97f13b21d76e2080ddeef5a79
- https://git.kernel.org/stable/c/d3ca9f7aeba793d74361d88a8800b2f205c9236b
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_async_work fails or when the current process is woken up.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_async_work fails or when the current process is woken up.
In the Linux kernel, the following vulnerability has been resolved: k ...
Уязвимость функции smb2_lock() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS