There is now a kernel patch for cifs that is supposed to fix the buffer
overflow in strcat.

Details see https://patchwork.kernel.org/patch/10931327/

An alternative workaround is to downgrade the connection to SMB2 (mount
option vers=2.0) as the bug only affects SMB2.1 and SMB3 code.


Regarding the second issue (BUG: unable to handle kernel NULL pointer 
dereference at 0000000000000038) it is likely that it is triggered by a 
racecondition aswell, which isn't yet fixed.


** Changed in: linux (Ubuntu)
       Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824981

Title:
  cifs set_oplock buffer overflow in strcat

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824981/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to