[SRU][J/F][PATCH 0/1] CVE-2024-26828
Bethany Jamison
bethany.jamison at canonical.com
Thu Apr 25 19:24:48 UTC 2024
[Impact]
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix underflow in parse_server_interfaces()
In this loop, we step through the buffer and after each item we check
if the size_left is greater than the minimum size we need. However,
the problem is that "bytes_left" is type ssize_t while sizeof() is type
size_t. That means that because of type promotion, the comparison is
done as an unsigned and if we have negative bytes left the loop
continues instead of ending.
[Fix]
Mantic: fixed via stable team
Jammy: Backported - parse_server_interfaces() is organized differently
than upstream I modified both the while loops with the same
sizeof() issue to match the intentions of the fix commit
Focal: Jammy patch applied cleanly.
Bionic: not-affected
Xenial: not-affected
Trusty: not-affected
[Test Case]
Compile and boot tested.
[Where problems could occur]
This fix affects those who use the CIFS protocol, an issue with this
fix would be visable to the user via unpredicted system behavior or a
system crash.
Dan Carpenter (1):
cifs: fix underflow in parse_server_interfaces()
fs/cifs/smb2ops.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--
2.34.1
More information about the kernel-team
mailing list