In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2lock() argv needs to be free when setupasync_work fails or when the current process is woken up.
{ "urgency": "not yet assigned" }
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54162.json"