We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
Reserved 2024-02-19 | Published 2024-04-28 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/8f8718afd446cd4ea3b62bacc3eec09f8aae85ee
git.kernel.org/...c/a140224bcf87eb98a87b67ff4c6826c57e47b704
git.kernel.org/...c/229042314602db62559ecacba127067c22ee7b88
git.kernel.org/...c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d
git.kernel.org/...c/3402faf78b2516b0af1259baff50cc8453ef0bd1
git.kernel.org/...c/ca545b7f0823f19db0f1148d59bc5e1a56634502
Support options