lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH2r5mtOMhHDNhjf0Lhd2nGLE4asiDex7q61fDj9qh1J6H+eag@mail.gmail.com>
Date:   Sat, 14 Oct 2023 21:46:47 -0500
From:   Steve French <smfrench@...il.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        CIFS <linux-cifs@...r.kernel.org>,
        Namjae Jeon <linkinjeon@...nel.org>
Subject: [GIT PULL] ksmbd server fixes

Please pull the following changes since commit
94f6f0550c625fab1f373bb86a6669b45e9748b3:

  Linux 6.6-rc5 (2023-10-08 13:49:43 -0700)

are available in the Git repository at:

  git://git.samba.org/ksmbd.git 6.6-rc5-ksmbd-server-fixes

for you to fetch changes up to 1903e6d0578118e9aab1ee23f4a9de55737d1d05:

  ksmbd: fix potential double free on smb2_read_pipe() error path
(2023-10-12 22:44:11 -0500)

----------------------------------------------------------------
Four SMB3 server fixes
- Fix for possible double free in RPC read
- Add additional check to clarify smb2_open path and quiet Coverity
- Fix incorrect error rsp in a compounding path
- Fix to properly fail open of file with pending delete on close
----------------------------------------------------------------
Namjae Jeon (4):
      ksmbd: not allow to open file if delelete on close bit is set
      ksmbd: fix wrong error response status by using set_smb2_rsp_status()
      ksmbd: fix Null pointer dereferences in ksmbd_update_fstate()
      ksmbd: fix potential double free on smb2_read_pipe() error path

 fs/smb/server/smb2pdu.c   | 11 ++++++-----
 fs/smb/server/vfs_cache.c |  7 +++++--
 2 files changed, 11 insertions(+), 7 deletions(-)

-- 
Thanks,

Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ