In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix user-after-free from session log off There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add session_lock when setting SMB2_SESSION_EXPIRED and referece count to session struct not to free session while it is being used.
Attack Vector | Local |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
Epss Score | 0.00042 |
---|---|
Epss Percentile | 0.05084 |
ریسک پائین:: این آسیب پذیری احتمال ارائه Exploit پائینی دارد. به روز رسانی و نظارت معمولی را لحاظ نمائید.
CPE | Vendor | Product | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | linux | linux_kernel | * | * |
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | linux | linux_kernel | 6.12 | rc1 |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | linux | linux_kernel | * | * |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | linux | linux_kernel | * | * |
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | linux | linux_kernel | 6.12 | rc3 |
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | linux | linux_kernel | 6.12 | rc2 |