HomeDefault status
unaffected
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before 196a3a7676d726ee67621ea2bf3b7815ac2685b4
affected
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before d3cb3f209d35c44b7ee74f77ed27ebb28995b9ce
affected
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before 9644798294c7287e65a7b26e35aa6d2ce3345bcc
affected
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before c64b915bb3d9339adcae5db4be2c35ffbef5e615
affected
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before e1868ba37fd27c6a68e31565402b154beaa65df0
affected
Default status
affected
5.15
affected
Any version before 5.15
unaffected
6.1.154 (semver)
unaffected
6.6.108 (semver)
unaffected
6.12.49 (semver)
unaffected
6.16.9 (semver)
unaffected
6.17 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size This is inspired by the check for data_offset + data_length.
Product status
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before 196a3a7676d726ee67621ea2bf3b7815ac2685b4
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before d3cb3f209d35c44b7ee74f77ed27ebb28995b9ce
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before 9644798294c7287e65a7b26e35aa6d2ce3345bcc
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before c64b915bb3d9339adcae5db4be2c35ffbef5e615
2ea086e35c3d726a3bacd0a971c1f02a50e98206 (git) before e1868ba37fd27c6a68e31565402b154beaa65df0
5.15
Any version before 5.15
6.1.154 (semver)
6.6.108 (semver)
6.12.49 (semver)
6.16.9 (semver)
6.17 (original_commit_for_fix)
References
git.kernel.org/...c/196a3a7676d726ee67621ea2bf3b7815ac2685b4
git.kernel.org/...c/d3cb3f209d35c44b7ee74f77ed27ebb28995b9ce
git.kernel.org/...c/9644798294c7287e65a7b26e35aa6d2ce3345bcc
git.kernel.org/...c/c64b915bb3d9339adcae5db4be2c35ffbef5e615
git.kernel.org/...c/e1868ba37fd27c6a68e31565402b154beaa65df0