[Bug 263043] malformed SMB reply can page-fault the kernel in smb_t2_placedata()

From: <bugzilla-noreply_at_freebsd.org>
Date: Wed, 06 Apr 2022 18:33:09 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263043

--- Comment #1 from commit-hook@FreeBSD.org ---
A commit in branch main references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=7c140ef034c33ab0b16b535f3d5f945dc8f71cb4

commit 7c140ef034c33ab0b16b535f3d5f945dc8f71cb4
Author:     Ed Maste <emaste@FreeBSD.org>
AuthorDate: 2022-04-06 18:25:37 +0000
Commit:     Ed Maste <emaste@FreeBSD.org>
CommitDate: 2022-04-06 18:32:09 +0000

    smbfs: caution against use in the manpage

    It supports only the obsolete SMBv1 protocol, is known to be buggy, and
    likely has security vulnerabilities.  It will either be updated or
    removed in the future, but for now at least describe the current state
    in the man page.

    PR:             263043
    MFC after:      3 days
    Sponsored by:   The FreeBSD Foundation

 share/man/man5/smbfs.5 | 21 ++++++++++++++++++++-
 1 file changed, 20 insertions(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.