Количество 31
Количество 31

CVE-2024-53173
In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVE-2024-53173
In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVE-2024-53173
In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

CVE-2024-53173
CVE-2024-53173
In the Linux kernel, the following vulnerability has been resolved: N ...
GHSA-79fx-6w6m-964r
In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.

BDU:2025-04994
Уязвимость функции nfs4_open_release() модуля fs/nfs/nfs4proc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации.

SUSE-SU-2025:0603-1
Security update for the Linux Kernel

SUSE-SU-2025:0855-1
Security update for the Linux Kernel

SUSE-SU-2025:0152-1
Security update for the Linux Kernel

SUSE-SU-2025:0835-1
Security update for the Linux Kernel

SUSE-SU-2025:0833-2
Security update for the Linux Kernel

SUSE-SU-2025:0833-1
Security update for the Linux Kernel

SUSE-SU-2025:0202-1
Security update for the Linux Kernel

SUSE-SU-2025:0203-1
Security update for the Linux Kernel

ROS-20250414-01
Множественные уязвимости kernel-lt

SUSE-SU-2025:0784-1
Security update for the Linux Kernel

SUSE-SU-2025:0955-1
Security update for the Linux Kernel

SUSE-SU-2025:0834-1
Security update for the Linux Kernel

SUSE-SU-2025:0856-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-53173 In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed. | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-53173 In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed. | CVSS3: 7 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2024-53173 In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed. | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | 5 месяцев назад | |
CVE-2024-53173 In the Linux kernel, the following vulnerability has been resolved: N ... | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
GHSA-79fx-6w6m-964r In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed. | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-04994 Уязвимость функции nfs4_open_release() модуля fs/nfs/nfs4proc.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации. | CVSS3: 7.8 | 0% Низкий | 7 месяцев назад |
![]() | SUSE-SU-2025:0603-1 Security update for the Linux Kernel | 4 месяца назад | ||
![]() | SUSE-SU-2025:0855-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0152-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2025:0835-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0833-2 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0833-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0202-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | SUSE-SU-2025:0203-1 Security update for the Linux Kernel | 5 месяцев назад | ||
![]() | ROS-20250414-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 2 месяца назад | |
![]() | SUSE-SU-2025:0784-1 Security update for the Linux Kernel | 4 месяца назад | ||
![]() | SUSE-SU-2025:0955-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0834-1 Security update for the Linux Kernel | 3 месяца назад | ||
![]() | SUSE-SU-2025:0856-1 Security update for the Linux Kernel | 3 месяца назад |
Уязвимостей на страницу