Utilities for mounting and managing CIFS mounts
Go to file
Alexander Bokovoy 80c65e7eb4 cifs-utils 6.15
Fixes: rhbz#2080525

- CVE-2022-27239: mount.cifs: fix length check for ip option parsing
- CVE-2022-29869: mount.cifs: fix verbose messages on option parsing

Description

CVE-2022-27239:

In cifs-utils through 6.14, a stack-based buffer overflow when parsing
the mount.cifs ip= command-line argument could lead to local attackers
gaining root privileges.

CVE-2022-29869:

cifs-utils through 6.14, with verbose logging, can cause an
information leak when a file contains = (equal sign) characters but is
not a valid credentials file.

Both issues were originally reported and fixed by Jeffrey Bencteux.

Signed-off-by: Alexander Bokovoy <abokovoy@redhat.com>
2022-04-30 20:43:32 +03:00
.gitignore cifs-utils 6.15 2022-04-30 20:43:32 +03:00
cifs-utils.spec cifs-utils 6.15 2022-04-30 20:43:32 +03:00
mount-crash-fix.patch Include a couple of important upstream fixes 2021-09-23 09:06:48 -05:00
sources cifs-utils 6.15 2022-04-30 20:43:32 +03:00
upcall-fix.patch Include a couple of important upstream fixes 2021-09-23 09:06:48 -05:00