commit | e8b7fa83afbdca0094da16f06b4b9d36f8b46102 | [log] [tgz] |
---|---|---|
author | Murad Masimov <[email protected]> | Tue Mar 11 17:22:04 2025 +0300 |
committer | Shuo Yang <[email protected]> | Thu Apr 17 12:08:00 2025 -0700 |
tree | aba65f25a91f33bf3dcfdf4136d76f9e34eb778c | |
parent | ecffcc7ce3f707af574ff59d15d3d0b4e142b0b7 [diff] |
cifs: Fix integer overflow while processing acdirmax mount option [ Upstream commit 5b29891f91dfb8758baf1e2217bef4b16b2b165b ] User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE. BUG=b/410772576 TEST=presubmit RELEASE_NOTE=Fixed CVE-2025-21963 in the Linux kernel. cos-patch: security-moderate Fixes: 4c9f948142a5 ("cifs: Add new mount parameter "acdirmax" to allow caching directory metadata") Change-Id: I7aee437ce2cfe2bdd5c9f5b8c36968bda8fc21a6 Signed-off-by: Murad Masimov <[email protected]> Signed-off-by: Steve French <[email protected]> Signed-off-by: Sasha Levin <[email protected]> Signed-off-by: Kernel CVE Triage Automation <[email protected]> Reviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/99207 Tested-by: Cusky Presubmit Bot <[email protected]> Reviewed-by: Shuo Yang <[email protected]> Reviewed-by: Arnav Kansal <[email protected]>