Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load/xa_store/xa_erase accesses.
Product status
1d9c4172110e645b383ff13eee759728d74f1a5d (git) before e4a8a96a93d08570e0405cfd989a8a07e5b6ff33
1d9c4172110e645b383ff13eee759728d74f1a5d (git) before 36ef605c0395b94b826a8c8d6f2697071173de6e
1d9c4172110e645b383ff13eee759728d74f1a5d (git) before 4f3a06cc57976cafa8c6f716646be6c79a99e485
b1caecbf34b8c8260d851ec4efde71f3694460b7 (git)
91bbf9cb2387a0d76322e9a343bc6bc160f66b3f (git)
853c416710b075153c1e1421e099ffbe5dac68ce (git)
6.3
Any version before 6.3
6.18.11 (semver)
6.19.1 (semver)
7.0-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/e4a8a96a93d08570e0405cfd989a8a07e5b6ff33
git.kernel.org/...c/36ef605c0395b94b826a8c8d6f2697071173de6e
git.kernel.org/...c/4f3a06cc57976cafa8c6f716646be6c79a99e485