We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf If ->ProtocolId is SMB2_TRANSFORM_PROTO_NUM, smb2 request size validation could be skipped. if request size is smaller than sizeof(struct smb2_query_info_req), slab-out-of-bounds read can happen in smb2_allocate_rsp_buf(). This patch allocate response buffer after decrypting transform request. smb3_decrypt_req() will validate transform request size and avoid slab-out-of-bound in smb2_allocate_rsp_buf().
Reserved 2024-02-19 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/da21401372607c49972ea87a6edaafb36a17c325
git.kernel.org/...c/b80ba648714e6d790d69610cf14656be222d0248
git.kernel.org/...c/3160d9734453a40db248487f8204830879c207f1
git.kernel.org/...c/0977f89722eceba165700ea384f075143f012085
git.kernel.org/...c/c119f4ede3fa90a9463f50831761c28f989bfb20
Support options