In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slub overflow in ksmbddecodentlmsspauthblob() If authblob->SessionKey.Length is bigger than session key size(CIFSKEYSIZE), slub overflow can happen in key exchange codes. cifsarc4crypt copy to session key array from SessionKey from client.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "6.5.0-1004.4", "binary_name": "linux-buildinfo-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-headers-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-image-unsigned-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-image-unsigned-6.5.0-1004-oem-dbgsym" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-ipu6-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-ivsc-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-modules-iwlwifi-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-oem-6.5-headers-6.5.0-1004" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-oem-6.5-lib-rust-6.5.0-1004-oem" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-oem-6.5-tools-6.5.0-1004" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-oem-6.5-tools-host" }, { "binary_version": "6.5.0-1004.4", "binary_name": "linux-tools-6.5.0-1004-oem" } ] }