lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH2r5mso+e44kRcGVf4aQ6qc5iwLp4gr6AsQGpLA06phqRA+ew@mail.gmail.com>
Date:   Fri, 4 Dec 2020 19:23:07 -0600
From:   Steve French <smfrench@...il.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     CIFS <linux-cifs@...r.kernel.org>,
        LKML <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] SMB3 Fixes

Please pull the following changes since commit
509a15421674b9e1a3e1916939d0d0efd3e578da:

  Merge tag '5.10-rc6-smb3-fixes' of
git://git.samba.org/sfrench/cifs-2.6 (2020-12-01 15:43:53 -0800)

are available in the Git repository at:

  git://git.samba.org/sfrench/cifs-2.6.git tags/5.10-rc6-smb3-fixes-part2

for you to fetch changes up to ea64370bcae126a88cd26a16f1abcc23ab2b9a55:

  cifs: refactor create_sd_buf() and and avoid corrupting the buffer
(2020-12-03 17:12:14 -0600)

----------------------------------------------------------------
Three smb3 fixes (two for stable) addressing
- a null pointer issue in a DFS error path
- a problem with excessive padding when mounted with "idsfromsid"
causing owner fields to get corrupted
- a more recent problem with compounded reparse point query found in
testing to the Linux kernel server

Test results:
http://smb3-test-rhel-75.southcentralus.cloudapp.azure.com/#/builders/2/builds/445
----------------------------------------------------------------
Aurelien Aptel (1):
      cifs: add NULL check for ses->tcon_ipc

Namjae Jeon (1):
      smb3: set COMPOUND_FID to FileID field of subsequent compound request

Ronnie Sahlberg (1):
      cifs: refactor create_sd_buf() and and avoid corrupting the buffer

 fs/cifs/connect.c |  3 ++-
 fs/cifs/smb2ops.c |  4 ++--
 fs/cifs/smb2pdu.c | 71 +++++++++++++++++++++++++++++--------------------------
 fs/cifs/smb2pdu.h |  2 --
 4 files changed, 42 insertions(+), 38 deletions(-)

-- 
Thanks,

Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ