Description
In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set. If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED.
Product status
0626e6641f6b467447c81dd7678a69c66f7746cf (git) before 24082642654f3e5149913946e89c00a297a8868f
0626e6641f6b467447c81dd7678a69c66f7746cf (git) before e38b415c024bc3b6321bf8650dbf3f4aab8e74b3
0626e6641f6b467447c81dd7678a69c66f7746cf (git) before 9da82dc73cb03e85d716a2609364572367a5ff47
5.15
Any version before 5.15
6.18.11 (semver)
6.19.1 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/24082642654f3e5149913946e89c00a297a8868f
git.kernel.org/...c/e38b415c024bc3b6321bf8650dbf3f4aab8e74b3
git.kernel.org/...c/9da82dc73cb03e85d716a2609364572367a5ff47