lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH2r5mu1Ha1DUq8T77hf-_2njaNLUKPa=yqkZurEtzFGrEoCVg@mail.gmail.com>
Date:   Sat, 29 Oct 2022 21:40:29 -0500
From:   Steve French <smfrench@...il.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     CIFS <linux-cifs@...r.kernel.org>,
        LKML <linux-kernel@...r.kernel.org>,
        ZhangXiaoxu <zhangxiaoxu5@...wei.com>,
        Zeng Heng <zengheng4@...wei.com>
Subject: [GIT PULL] smb3 client fixes

Please pull the following changes since commit
247f34f7b80357943234f93f247a1ae6b6c3a740:

  Linux 6.1-rc2 (2022-10-23 15:27:33 -0700)

are available in the Git repository at:

  git://git.samba.org/sfrench/cifs-2.6.git tags/6.1-rc2-smb3-fixes

for you to fetch changes up to 153695d36ead0ccc4d0256953c751cabf673e621:

  cifs: fix use-after-free caused by invalid pointer `hostname`
(2022-10-27 23:59:13 -0500)

----------------------------------------------------------------
3 cifs/smb3 fixes (also for stable)
- use after free fix for reconnect race
- two memory leak fixes

A broader fix for reconnect races (killing the cifsd thread earlier),
and an important for for multichannel oplock breaks are not included
in this P/R since still being tested.
----------------------------------------------------------------
Zeng Heng (1):
      cifs: fix use-after-free caused by invalid pointer `hostname`

Zhang Xiaoxu (2):
      cifs: Fix pages array leak when writedata alloc failed in
cifs_writedata_alloc()
      cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter()

 fs/cifs/connect.c |  1 +
 fs/cifs/file.c    | 13 ++++++++++---


-- 
Thanks,

Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ