In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing connections try to use smb_direct_wq as a NULL pointer.
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | WSA8840 |
| Linux | Linux | The first 5 digits of serial No. "26041" and prior |
| Linux | Linux | < 107 |