In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (empty) send. In order to fix this we'll have a single 'batch' credit per connection. And code getting that credit is free to use as much messages until remaining_length reaches 0, then the batch credit it given back and the next logical send can happen.
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | 12.2.1.2.0 |
| Linux | Linux | < 2.x |
| Linux | Linux | 4.0.7 |
| Linux | Linux | R3.09.50 and earlier |