| Summary | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free by using call_rcu() for oplock_info ksmbd currently frees oplock_info immediately using kfree(), even Since there is no RCU grace period delay between nullifying the pointer Fix this by switching to deferred freeing using call_rcu(). |
|---|---|
| Publication Date | May 9, 2026, 12:16 a.m. |
| Registration Date | May 9, 2026, 4:14 a.m. |
| Last Update | May 9, 2026, 12:16 a.m. |