We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_sessions_deregister() In multichannel mode, UAF issue can occur in session_deregister when the second channel sets up a session through the connection of the first channel. session that is freed through the global session table can be accessed again through ->sessions of connection.
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/f0eb3f575138b816da74697bd506682574742fcd
git.kernel.org/...c/a8a8ae303a8395cbac270b5b404d85df6ec788f8
git.kernel.org/...c/ca042cc0e4f9e0d2c8f86dd67e4b22f30a516a9b
git.kernel.org/...c/8ed0e9d2f410f63525afb8351181eea36c80bcf1
git.kernel.org/...c/33cc29e221df7a3085ae413e8c26c4e81a151153
git.kernel.org/...c/15a9605f8d69dc85005b1a00c31a050b8625e1aa
Support options