Description
In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.
Product status
cca0526ef2344cab6944d7f441fc24e152da031b (git) before a9940dcbe5cb92482c04efc7341039ddf7dbf607
37b5c06956183b65e6808b509cf637632016cdf7 (git) before 22b7c1c619d808aec4cad3dc42103345e370d107
21538121efe6c8c5b51c742fa02cbe820bc48714 (git) before f9a162c2bbcd0ac85bd07c5b37cf20286048b65c
21538121efe6c8c5b51c742fa02cbe820bc48714 (git) before 27b7c3e916218b5eb2ee350211140e961bfc49be
7.0
Any version before 7.0
6.18.24 (semver)
6.19.14 (semver)
7.0.1 (semver)
7.1-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/a9940dcbe5cb92482c04efc7341039ddf7dbf607
git.kernel.org/...c/22b7c1c619d808aec4cad3dc42103345e370d107
git.kernel.org/...c/f9a162c2bbcd0ac85bd07c5b37cf20286048b65c
git.kernel.org/...c/27b7c3e916218b5eb2ee350211140e961bfc49be