Описание
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: not allow guest user on multichannel
This patch return STATUS_NOT_SUPPORTED if binding session is guest.
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: not allow guest user on multichannel
This patch return STATUS_NOT_SUPPORTED if binding session is guest.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-32249
- https://git.kernel.org/stable/c/088131b7b01099720a528a72005ff17868705d40
- https://git.kernel.org/stable/c/1f0490586544455e5be698be2e6c30077b4ec461
- https://git.kernel.org/stable/c/3353ab2df5f68dab7da8d5ebb427a2d265a1f2b2
- https://git.kernel.org/stable/c/4a98e859c4673013385a54084e0cd865695ca072
- https://git.kernel.org/stable/c/ed76d3a8910be06cd4e4ba63bf6075bf903945a1
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.
In the Linux kernel, the following vulnerability has been resolved: k ...
Уязвимость модуля ksmbd ядра операционных систем Linux, позволяющая нарушителю перехватить действующий сеанс
EPSS