Логотип exploitDog
bind:"BDU:2024-04576" OR bind:"CVE-2023-52752"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-04576" OR bind:"CVE-2023-52752"

Количество 146

Количество 146

fstec логотип

BDU:2024-04576

около 2 лет назад

Уязвимость функции cifs_debug_data_proc_show() реализации клиента протокола SMB ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20251023-01

13 дней назад

Множественные уязвимости kernel-lt

CVSS3: 8.1
EPSS: Низкий
ubuntu логотип

CVE-2023-52752

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.263291] proc_reg_read_iter+0x53/0...

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-52752

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.263291] proc_reg_read_iter+0x53/0...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2023-52752

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.26329

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2023-52752

2 месяца назад

smb: client: fix use-after-free bug in cifs_debug_data_proc_show()

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-52752

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3885-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3775-1

около 1 года назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3764-1

около 1 года назад

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)

EPSS: Низкий
github логотип

GHSA-c3wm-p2jr-8f5g

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.26...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0179-1

10 месяцев назад

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0085-1

10 месяцев назад

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3884-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3835-1

около 1 года назад

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3882-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3881-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3850-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3804-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3797-1

около 1 года назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-04576

Уязвимость функции cifs_debug_data_proc_show() реализации клиента протокола SMB ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.8
0%
Низкий
около 2 лет назад
redos логотип
ROS-20251023-01

Множественные уязвимости kernel-lt

CVSS3: 8.1
13 дней назад
ubuntu логотип
CVE-2023-52752

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.263291] proc_reg_read_iter+0x53/0...

CVSS3: 7.8
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-52752

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.263291] proc_reg_read_iter+0x53/0...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-52752

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.26329

CVSS3: 7.8
0%
Низкий
больше 1 года назад
msrc логотип
CVE-2023-52752

smb: client: fix use-after-free bug in cifs_debug_data_proc_show()

CVSS3: 7.8
0%
Низкий
2 месяца назад
debian логотип
CVE-2023-52752

In the Linux kernel, the following vulnerability has been resolved: s ...

CVSS3: 7.8
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3885-1

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3775-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3764-1

Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)

0%
Низкий
около 1 года назад
github логотип
GHSA-c3wm-p2jr-8f5g

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @ses. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.26...

CVSS3: 7.8
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0179-1

Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0085-1

Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6)

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3884-1

Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3835-1

Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3882-1

Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3881-1

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3850-1

Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3804-1

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3797-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3)

около 1 года назад

Уязвимостей на страницу