-

CVE-2023-53751

cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname

TCP_Server_Info::hostname may be updated once or many times during
reconnect, so protect its access outside reconnect path as well and
then prevent any potential use-after-free bugs.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 93d5cb517db39e8af8d1292f9e785e4983b7f708
Version < 64d62ac6d6514cba1305bd08e271ec1843bdd612
Status affected
Version 93d5cb517db39e8af8d1292f9e785e4983b7f708
Version < c511954bf142fe1995aec3c739a9f1a76990283a
Status affected
Version 93d5cb517db39e8af8d1292f9e785e4983b7f708
Version < 0b08c4c499200be67d54c439d56e5ea866869945
Status affected
Version 93d5cb517db39e8af8d1292f9e785e4983b7f708
Version < 90c49fce1c43e1cc152695e20363ff5087897c09
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.0
Status affected
Version 0
Version < 5.0
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.061
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.