ACK: [SRU][J/F][PATCH 0/1] CVE-2024-26828
Kevin Becker
kevin.becker at canonical.com
Fri Apr 26 13:08:10 UTC 2024
On Thu, Apr 25, 2024 at 3:25 PM Bethany Jamison
<bethany.jamison at canonical.com> wrote:
>
> [Impact]
>
> In the Linux kernel, the following vulnerability has been resolved:
>
> cifs: fix underflow in parse_server_interfaces()
>
> In this loop, we step through the buffer and after each item we check
> if the size_left is greater than the minimum size we need. However,
> the problem is that "bytes_left" is type ssize_t while sizeof() is type
> size_t. That means that because of type promotion, the comparison is
> done as an unsigned and if we have negative bytes left the loop
> continues instead of ending.
>
> [Fix]
>
> Mantic: fixed via stable team
> Jammy: Backported - parse_server_interfaces() is organized differently
> than upstream I modified both the while loops with the same
> sizeof() issue to match the intentions of the fix commit
> Focal: Jammy patch applied cleanly.
> Bionic: not-affected
> Xenial: not-affected
> Trusty: not-affected
>
> [Test Case]
>
> Compile and boot tested.
>
> [Where problems could occur]
>
> This fix affects those who use the CIFS protocol, an issue with this
> fix would be visable to the user via unpredicted system behavior or a
> system crash.
>
> Dan Carpenter (1):
> cifs: fix underflow in parse_server_interfaces()
>
> fs/cifs/smb2ops.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
Acked-by: Kevin Becker <kevin.becker at canonical.com>
More information about the kernel-team
mailing list