We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb_break_all_levII_oplock() There is a room in smb_break_all_levII_oplock that can cause racy issues when unlocking in the middle of the loop. This patch use read lock to protect whole loop.
Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/296cb5457cc6f4a754c4ae29855f8a253d52bcc6
git.kernel.org/...c/d54ab1520d43e95f9b2e22d7a05fc9614192e5a5
git.kernel.org/...c/d73686367ad68534257cd88a36ca3c52cb8b81d8
git.kernel.org/...c/18b4fac5ef17f77fed9417d22210ceafd6525fc7
Support options