Логотип exploitDog
bind: "CVE-2024-53173"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-53173"

Количество 62

Количество 62

ubuntu логотип

CVE-2024-53173

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-53173

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2024-53173

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2024-53173

6 месяцев назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-53173

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: N ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-79fx-6w6m-964r

7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-04994

9 месяцев назад

Уязвимость функции nfs4_open_release() модуля fs/nfs/nfs4proc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02507-1

11 дней назад

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02415-1

14 дней назад

Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02396-1

14 дней назад

Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02454-1

14 дней назад

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02422-1

14 дней назад

Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02392-1

16 дней назад

Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02391-1

16 дней назад

Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02446-1

14 дней назад

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02428-1

14 дней назад

Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02410-1

14 дней назад

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02401-1

14 дней назад

Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02459-1

14 дней назад

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02434-1

14 дней назад

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-53173

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7.8
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2024-53173

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2024-53173

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7.8
0%
Низкий
7 месяцев назад
msrc логотип
CVSS3: 7.8
0%
Низкий
6 месяцев назад
debian логотип
CVE-2024-53173

In the Linux kernel, the following vulnerability has been resolved: N ...

CVSS3: 7.8
0%
Низкий
7 месяцев назад
github логотип
GHSA-79fx-6w6m-964r

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVSS3: 7.8
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-04994

Уязвимость функции nfs4_open_release() модуля fs/nfs/nfs4proc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.

CVSS3: 7.8
0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02507-1

Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

11 дней назад
suse-cvrf логотип
SUSE-SU-2025:02415-1

Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02396-1

Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02454-1

Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02422-1

Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02392-1

Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5)

16 дней назад
suse-cvrf логотип
SUSE-SU-2025:02391-1

Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)

16 дней назад
suse-cvrf логотип
SUSE-SU-2025:02446-1

Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02428-1

Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02410-1

Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02401-1

Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02459-1

Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

14 дней назад
suse-cvrf логотип
SUSE-SU-2025:02434-1

Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)

14 дней назад

Уязвимостей на страницу