In the Linux kernel, the following vulnerability has been resolved:smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()!Otherwise already existing connections try to use smb_direct_wq asa NULL pointer.
No PoCs from references.
- https://github.com/w4zu/Debian_security