80c65e7eb4
Fixes: rhbz#2080525 - CVE-2022-27239: mount.cifs: fix length check for ip option parsing - CVE-2022-29869: mount.cifs: fix verbose messages on option parsing Description CVE-2022-27239: In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. CVE-2022-29869: cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. Both issues were originally reported and fixed by Jeffrey Bencteux. Signed-off-by: Alexander Bokovoy <abokovoy@redhat.com>
31 lines
724 B
Plaintext
31 lines
724 B
Plaintext
cifs-utils-4.5.tar.bz2
|
|
cifs-utils-4.6.tar.bz2
|
|
/cifs-utils-4.7.tar.bz2
|
|
/cifs-utils-4.8.tar.bz2
|
|
/cifs-utils-4.8.1.tar.bz2
|
|
/cifs-utils-4.9.tar.bz2
|
|
/cifs-utils-5.0.tar.bz2
|
|
/cifs-utils-5.1.tar.bz2
|
|
/cifs-utils-5.2.tar.bz2
|
|
/cifs-utils-5.3.tar.bz2
|
|
/cifs-utils-5.4.tar.bz2
|
|
/cifs-utils-5.5.tar.bz2
|
|
/cifs-utils-5.6.tar.bz2
|
|
/cifs-utils-5.7.tar.bz2
|
|
/cifs-utils-5.8.tar.bz2
|
|
/cifs-utils-5.9.tar.bz2
|
|
/cifs-utils-6.0.tar.bz2
|
|
/cifs-utils-6.1.tar.bz2
|
|
/cifs-utils-6.2.tar.bz2
|
|
/cifs-utils-6.3.tar.bz2
|
|
/cifs-utils-6.4.tar.bz2
|
|
/cifs-utils-6.5.tar.bz2
|
|
/cifs-utils-6.6.tar.bz2
|
|
/cifs-utils-6.7.tar.bz2
|
|
/cifs-utils-6.8.tar.bz2
|
|
/cifs-utils-6.9.tar.bz2
|
|
/cifs-utils-6.11.tar.bz2
|
|
/cifs-utils-6.13.tar.bz2
|
|
/cifs-utils-6.14.tar.bz2
|
|
/cifs-utils-6.15.tar.bz2
|