Description
In the Linux kernel, the following vulnerability has been resolved: smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to the batch list.
Product status
5ef18a2e66f2f33fdac64437bddfb9fe6389fdc7 (git) before 6968c91fab05b8fc4d6700e0cf34472bb422df25
79242e7b6bc63efec28b7c235bc320806afce6c0 (git) before 2ba03f46132b0d1a7bafb86e1ef61951a2254023
34abd408c8ba24d7c97bd02ba874d8c714f49db1 (git) before 830de6eeb9db4cb7e758201fb99328ef4ca4b032
34abd408c8ba24d7c97bd02ba874d8c714f49db1 (git) before 84ff995ae826aa6bbcc6c7b9ea569ff67c021d72
7.0
Any version before 7.0
6.18.24 (semver)
6.19.14 (semver)
7.0.1 (semver)
7.1-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/6968c91fab05b8fc4d6700e0cf34472bb422df25
git.kernel.org/...c/2ba03f46132b0d1a7bafb86e1ef61951a2254023
git.kernel.org/...c/830de6eeb9db4cb7e758201fb99328ef4ca4b032
git.kernel.org/...c/84ff995ae826aa6bbcc6c7b9ea569ff67c021d72