Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: skip lock-range check on equal size to avoid size==0 underflow When size equals the current i_size (including 0), the code used to call check_lock_range(filp, i_size, size - 1, WRITE), which computes `size - 1` and can underflow for size==0. Skip the equal case.
Product status
f44158485826c076335d6860d35872271a83791d (git) before 52fcbb92e0d3acfd1448b2a43b6595d540da5295
f44158485826c076335d6860d35872271a83791d (git) before da29cd197246c85c0473259f1cad897d9d28faea
f44158485826c076335d6860d35872271a83791d (git) before a6f4cfa3783804336491e0edcb250c25f9b59d33
f44158485826c076335d6860d35872271a83791d (git) before 571204e4758a528fbd67330bd4b0dfbdafb33dd8
f44158485826c076335d6860d35872271a83791d (git) before 5d510ac31626ed157d2182149559430350cf2104
5.15
Any version before 5.15
6.1.160 (semver)
6.6.120 (semver)
6.12.64 (semver)
6.18.3 (semver)
6.19 (original_commit_for_fix)
References
git.kernel.org/...c/52fcbb92e0d3acfd1448b2a43b6595d540da5295
git.kernel.org/...c/da29cd197246c85c0473259f1cad897d9d28faea
git.kernel.org/...c/a6f4cfa3783804336491e0edcb250c25f9b59d33
git.kernel.org/...c/571204e4758a528fbd67330bd4b0dfbdafb33dd8
git.kernel.org/...c/5d510ac31626ed157d2182149559430350cf2104