We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/513f6cf2e906a504b7ab0b62b2eea993a6f64558
git.kernel.org/...c/9968fcf02cf6b0f78fbacf3f63e782162603855a
git.kernel.org/...c/6c13fcb7cf59ae65940da1dfea80144e42921e53
git.kernel.org/...c/1c46673be93dd2954f44fe370fb4f2b8e6214224
git.kernel.org/...c/b24edd5c191c2689c59d0509f0903f9487eb6317
git.kernel.org/...c/d5a30fddfe2f2e540f6c43b59cf701809995faef
Support options