ACK: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-6606
Jacob Martin
jacob.martin at canonical.com
Wed Jan 3 14:17:56 UTC 2024
- Previous message (by thread): ACK: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-6606
- Next message (by thread): APPLIED[M,L,J,F]: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-6606
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Acked-by: Jacob Martin <jacob.martin at canonical.com>
On 1/3/24 6:12 AM, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An out-of-bounds access in cifs filesystem may lead to crashes or
> information leak.
>
> [Test case]
> A PoC from the kernel.org bugzilla was used and a different error message
> was present in dmesg as expected:
>
> [ 518.358312] CIFS: VFS: checkSMB: can't read BCC due to invalid WordCount(240)
>
> [Backport]
> Clean cherry-pick on all kernels. For 5.15 and earlier kernels, the file
> has been moved, hence the second patch version.
>
> [Potential regression]
> Failure to mount cifs or filesystem corruption on cifs mounts.
>
> Paulo Alcantara (1):
> smb: client: fix OOB in smbCalcSize()
>
> fs/smb/client/misc.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
- Previous message (by thread): ACK: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-6606
- Next message (by thread): APPLIED[M,L,J,F]: [SRU Focal,Jammy,OEM-6.1,Lunar,Mantic 0/1] CVE-2023-6606
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list