Description
In the Linux kernel, the following vulnerability has been resolved: cifs: prevent use-after-free by freeing the cfile later In smb2_compound_op we have a possible use-after-free which can cause hard to debug problems later on. This was revealed during stress testing with KASAN enabled kernel. Fixing it by moving the cfile free call to a few lines below, after the usage.
Product status
76894f3e2f71177747b8b4763fb180e800279585 (git) before 4fe07d55a5461e66a55fbefb57f85ff0facea32b
76894f3e2f71177747b8b4763fb180e800279585 (git) before b6353518ef8180816e863aa23b06456f395404d6
76894f3e2f71177747b8b4763fb180e800279585 (git) before d017880782cf71f8820ee4a2002843893176501d
76894f3e2f71177747b8b4763fb180e800279585 (git) before 33f736187d08f6bc822117629f263b97d3df4165
2d046892a493d9760c35fdaefc3017f27f91b621 (git)
6.1
Any version before 6.1
6.1.39 (semver)
6.3.13 (semver)
6.4.4 (semver)
6.5 (original_commit_for_fix)
References
git.kernel.org/...c/4fe07d55a5461e66a55fbefb57f85ff0facea32b
git.kernel.org/...c/b6353518ef8180816e863aa23b06456f395404d6
git.kernel.org/...c/d017880782cf71f8820ee4a2002843893176501d
git.kernel.org/...c/33f736187d08f6bc822117629f263b97d3df4165