A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705 https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2242280]
A use-after-free vulnerability in the Linux kernel's SMB client component, potentially allowing privilege escalation. https://mycenturahealth.site/
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:7734 https://access.redhat.com/errata/RHSA-2023:7734
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:7749 https://access.redhat.com/errata/RHSA-2023:7749
The https://mycenturahealth.click/ patient portal is a convenient tool to help you manage your health online. Once you’ve registered, you can view your past medical history, check current lab results, and pay your medical bills online. You can also order and request prescriptions, get your immunizations, and receive reminders about upcoming appointments and tests.