We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix r_count dec/increment mismatch r_count is only increased when there is an oplock break wait, so r_count inc/decrement are not paired. This can cause r_count to become negative, which can lead to a problem where the ksmbd thread does not terminate.
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/4790bcb269e5d6d88200a67c54ae6d627332a3be
git.kernel.org/...c/457db486203c90e10c3efc87fd45cc7000b1cd36
git.kernel.org/...c/20378cf48359f39dee0ef9b61470ebe77bd49c0d
git.kernel.org/...c/c2ec33d46b4d1c8085dab5d02e00b21f4f0fb8a9
git.kernel.org/...c/ddb7ea36ba7129c2ed107e2186591128618864e1
Support options