Commit 8a368f6
committed
cifs: Fix integer overflow while processing acdirmax mount option
jira LE-3262
cve CVE-2025-21963
Rebuild_History Non-Buildable kernel-5.14.0-570.22.1.el9_6
commit-author Murad Masimov <m.masimov@mt-integration.ru>
commit 5b29891
User-provided mount parameter acdirmax of type u32 is intended to have
an upper limit, but before it is validated, the value is converted from
seconds to jiffies which can lead to an integer overflow.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Fixes: 4c9f948 ("cifs: Add new mount parameter "acdirmax" to allow caching directory metadata")
Signed-off-by: Murad Masimov <m.masimov@mt-integration.ru>
Signed-off-by: Steve French <stfrench@microsoft.com>
(cherry picked from commit 5b29891)
Signed-off-by: Jonathan Maple <jmaple@ciq.com>1 parent e883ebb commit 8a368f6
1 file changed
+2
-2
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
1366 | 1366 | | |
1367 | 1367 | | |
1368 | 1368 | | |
1369 | | - | |
1370 | | - | |
| 1369 | + | |
1371 | 1370 | | |
1372 | 1371 | | |
1373 | 1372 | | |
| 1373 | + | |
1374 | 1374 | | |
1375 | 1375 | | |
1376 | 1376 | | |
| |||
0 commit comments