We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds stream writes by validating *pos ksmbd_vfs_stream_write() did not validate whether the write offset (*pos) was within the bounds of the existing stream data length (v_len). If *pos was greater than or equal to v_len, this could lead to an out-of-bounds memory write. This patch adds a check to ensure *pos is less than v_len before proceeding. If the condition fails, -EINVAL is returned.
Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/7f61da79df86fd140c7768e668ad846bfa7ec8e1
git.kernel.org/...c/04c8a38c60346bb5a7c49b276de7233f703ce9cb
git.kernel.org/...c/d62ba16563a86aae052f96d270b3b6f78fca154c
git.kernel.org/...c/e6356499fd216ed6343ae0363f4c9303f02c5034
git.kernel.org/...c/0ca6df4f40cf4c32487944aaf48319cb6c25accc
Support options