-

CVE-2023-53751

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname

TCP_Server_Info::hostname may be updated once or many times during
reconnect, so protect its access outside reconnect path as well and
then prevent any potential use-after-free bugs.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 64d62ac6d6514cba1305bd08e271ec1843bdd612
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c511954bf142fe1995aec3c739a9f1a76990283a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0b08c4c499200be67d54c439d56e5ea866869945
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 90c49fce1c43e1cc152695e20363ff5087897c09
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.036
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String