We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb2_lock If smb_lock->zero_len has value, ->llist of smb_lock is not delete and flock is old one. It will cause use-after-free on error handling routine.
Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/410ce35a2ed6d0e114132bba29af49b69880c8c7
git.kernel.org/...c/8573571060ca466cbef2c6f03306b2cc7b883506
git.kernel.org/...c/a0609097fd10d618aed4864038393dd75131289e
git.kernel.org/...c/636e021646cf9b52ddfea7c809b018e91f2188cb
git.kernel.org/...c/84d2d1641b71dec326e8736a749b7ee76a9599fc
Support options