Количество 8
Количество 8
CVE-2025-38561
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase.
CVE-2025-38561
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase.
CVE-2025-38561
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase.
CVE-2025-38561
ksmbd: fix Preauh_HashValue race condition
CVE-2025-38561
In the Linux kernel, the following vulnerability has been resolved: k ...
GHSA-6mwh-579p-fgpg
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase.
BDU:2025-10729
Уязвимость функции smb2_sess_setup() в модуле fs/smb/server/smb2pdu.c поддержки сервера SMB ядра операционной системы Linux, позволяющая нарушителю, действующему удалённо, оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
ROS-20260324-73-0001
Уязвимость kernel-lt
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase. | CVSS3: 4.7 | 0% Низкий | 7 месяцев назад | |
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase. | 0% Низкий | 7 месяцев назад | ||
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase. | CVSS3: 4.7 | 0% Низкий | 7 месяцев назад | |
CVE-2025-38561 ksmbd: fix Preauh_HashValue race condition | 0% Низкий | 7 месяцев назад | ||
CVE-2025-38561 In the Linux kernel, the following vulnerability has been resolved: k ... | CVSS3: 4.7 | 0% Низкий | 7 месяцев назад | |
GHSA-6mwh-579p-fgpg In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Preauh_HashValue race condition If client send multiple session setup requests to ksmbd, Preauh_HashValue race condition could happen. There is no need to free sess->Preauh_HashValue at session setup phase. It can be freed together with session at connection termination phase. | CVSS3: 8.5 | 0% Низкий | 7 месяцев назад | |
BDU:2025-10729 Уязвимость функции smb2_sess_setup() в модуле fs/smb/server/smb2pdu.c поддержки сервера SMB ядра операционной системы Linux, позволяющая нарушителю, действующему удалённо, оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.5 | 0% Низкий | 8 месяцев назад | |
ROS-20260324-73-0001 Уязвимость kernel-lt | CVSS3: 7.5 | 0% Низкий | 3 дня назад |
Уязвимостей на страницу