Description
In the Linux kernel, the following vulnerability has been resolved: cifs: fix session state check in reconnect to avoid use-after-free issue Don't collect exiting session in smb2_reconnect_server(), because it will be released soon. Note that the exiting session will stay in server->smb_ses_list until it complete the cifs_free_ipc() and logoff() and then delete itself from the list.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 7e4f5c3f01fb0e51ca438e43262d858daf9a0a76
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 759ffc164d95a32c09528766d74d9b4fb054e8f4
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 99f280700b4cc02d5f141b8d15f8e9fad0418f65
6.1.47 (semver)
6.4.12 (semver)
6.5 (original_commit_for_fix)
References
git.kernel.org/...c/7e4f5c3f01fb0e51ca438e43262d858daf9a0a76
git.kernel.org/...c/759ffc164d95a32c09528766d74d9b4fb054e8f4
git.kernel.org/...c/99f280700b4cc02d5f141b8d15f8e9fad0418f65