CVE-2023-3867
- EPSS 0.1%
- Veröffentlicht 16.08.2025 13:29:51
- Zuletzt bearbeitet 18.11.2025 17:58:23
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read in smb2_sess_setup ksmbd does not consider the case of that smb2 session setup is in compound request. If this is the second payload of the compound, ...
CVE-2023-4130
- EPSS 0.01%
- Veröffentlicht 16.08.2025 13:27:58
- Zuletzt bearbeitet 18.11.2025 17:58:43
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea() There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request from client. ksmbd find next smb2_...
CVE-2023-3866
- EPSS 0.01%
- Veröffentlicht 16.08.2025 13:27:57
- Zuletzt bearbeitet 18.11.2025 17:58:12
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in the compound request This patch validate session id and tree id in compound request. If first operation in the compound is SMB2 ECHO reque...
CVE-2023-3865
- EPSS 0.02%
- Veröffentlicht 16.08.2025 13:27:56
- Zuletzt bearbeitet 18.11.2025 17:57:24
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out-of-bound read in smb2_write ksmbd_smb2_check_message doesn't validate hdr->NextCommand. If ->NextCommand is bigger than Offset + Length of smb2 write, It will allow ...
CVE-2023-4515
- EPSS 0.02%
- Veröffentlicht 16.08.2025 13:25:50
- Zuletzt bearbeitet 18.11.2025 17:59:02
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate command request size In commit 2b9b8f3b68ed ("ksmbd: validate command payload size"), except for SMB2_OPLOCK_BREAK_HE command, the request size of other commands is...
CVE-2023-32249
- EPSS 0.03%
- Veröffentlicht 16.08.2025 13:25:49
- Zuletzt bearbeitet 18.11.2025 17:57:18
In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.
CVE-2023-32246
- EPSS 0.06%
- Veröffentlicht 16.08.2025 13:22:09
- Zuletzt bearbeitet 18.11.2025 18:10:46
In the Linux kernel, the following vulnerability has been resolved: ksmbd: call rcu_barrier() in ksmbd_server_exit() racy issue is triggered the bug by racing between closing a connection and rmmod. In ksmbd, rcu_barrier() is not called at module u...
CVE-2025-38552
- EPSS 0.02%
- Veröffentlicht 16.08.2025 11:34:20
- Zuletzt bearbeitet 07.01.2026 18:31:15
In the Linux kernel, the following vulnerability has been resolved: mptcp: plug races between subflow fail and subflow creation We have races similar to the one addressed by the previous patch between subflow failing and additional subflow creation...
CVE-2025-38551
- EPSS 0.01%
- Veröffentlicht 16.08.2025 11:34:19
- Zuletzt bearbeitet 18.11.2025 18:10:27
In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix recursived rtnl_lock() during probe() The deadlock appears in a stack trace like: virtnet_probe() rtnl_lock() virtio_config_changed_work() netdev_n...
CVE-2025-38550
- EPSS 0.02%
- Veröffentlicht 16.08.2025 11:34:18
- Zuletzt bearbeitet 07.01.2026 18:32:32
In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: Delay put pmc->idev in mld_del_delrec() pmc->idev is still used in ip6_mc_clear_src(), so as mld_clear_delrec() does, the reference should be put after ip6_mc_clear_sr...