[Bug 263043] malformed SMB reply can page-fault the kernel in smb_t2_placedata()

From: <bugzilla-noreply_at_freebsd.org>
Date: Sat, 09 Apr 2022 00:57:07 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=263043

--- Comment #3 from commit-hook@FreeBSD.org ---
A commit in branch stable/12 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=c054fcae14d1883d7a6edce16b24cd328edd0079

commit c054fcae14d1883d7a6edce16b24cd328edd0079
Author:     Ed Maste <emaste@FreeBSD.org>
AuthorDate: 2022-04-06 18:25:37 +0000
Commit:     Ed Maste <emaste@FreeBSD.org>
CommitDate: 2022-04-09 00:56:01 +0000

    smbfs: caution against use in the manpage

    It supports only the obsolete SMBv1 protocol, is known to be buggy, and
    likely has security vulnerabilities.  It will either be updated or
    removed in the future, but for now at least describe the current state
    in the man page.

    PR:             263043
    MFC after:      3 days
    Sponsored by:   The FreeBSD Foundation

    (cherry picked from commit 7c140ef034c33ab0b16b535f3d5f945dc8f71cb4)

 share/man/man5/smbfs.5 | 21 ++++++++++++++++++++-
 1 file changed, 20 insertions(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.