In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifs_stats_proc_show()
Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
Greg Kroah-Hartman wrote on Wed, May 29, 2024 at 09:23:50PM +0200:
(pedantic: `if cve=$(cve_search "$id"); then` is a bit simpler/failproof)
That's roughly what I had done earlier this week (handpicking the
commits that could impact our users), but this doesn't address my second
point as it won't catch any new CVE introduced before that tree tha ...
On Wed, May 29, 2024 at 09:53:48AM +0900, Dominique Martinet wrote:
True, we don't have that yet, but with the scripts in there, it should
be easy to knock this up (hint, pass the id to scripts/cve_search) if
you need it
The issue is, CVEs are assigned usually long _AFTER_ the stable release
has happened So if you want to do this type of re ...
On Thu, May 30, 2024 at 01:45:39PM +0900, Dominique Martinet wrote:
Very true, I do not claim to be a "robust" bash programmer at all :)
True
Yeah, but the json files have their own issues, more below
Great Only you know your use cases, which is why we do not offer up
any "grading" of kernel CVEs as Linux is used in so many differe ...