We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate request buffer size in smb2_allocate_rsp_buf() The response buffer should be allocated in smb2_allocate_rsp_buf before validating request. But the fields in payload as well as smb2 header is used in smb2_allocate_rsp_buf(). This patch add simple buffer size validation to avoid potencial out-of-bounds in request buffer.
Reserved 2024-02-19 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/8f3d0bf1d0c62b539d54c5b9108a845cff619b99
git.kernel.org/...c/21ff9d7d223c5c19cb4334009e4c0c83a2f4d674
git.kernel.org/...c/5c20b242d4fed73a93591e48bfd9772e2322fb11
git.kernel.org/...c/2c27a64a2bc47d9bfc7c3cf8be14be53b1ee7cb6
git.kernel.org/...c/17cf0c2794bdb6f39671265aa18aea5c22ee8c4a
Support options