发布时间: 2024年5月17日
修改时间: 2024年10月31日
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending.
NVD | openEuler | |
---|---|---|
Confidentiality | None | |
Attack Vector | Network | |
CVSS评分 | N/A | 7.3 |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | Required | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4777 | kernel security update | 2025年2月17日 |
KylinSec-SA-2024-4952 | kernel security update | 2025年2月28日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Fixed |
KY3.4-5 | kernel | Fixed |
KY3.5.2 | kernel | Fixed |
KY3.5.1 | kernel | Fixed |