Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4080982ybi; Tue, 11 Jun 2019 00:20:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqxdCSPeWW6Kjr1lbOuVb18Zw8XTS/6VHE8/I5N/BF0Ld56pthB0brYmZ/66Hie6finWZMdE X-Received: by 2002:a63:de43:: with SMTP id y3mr19817880pgi.271.1560237649454; Tue, 11 Jun 2019 00:20:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560237649; cv=none; d=google.com; s=arc-20160816; b=a4eBEvDKGgTSuAnbfehdgymfu0676IWJ3eeum/5S0wBV5YHokaW2C5TEpOg2ubuh8v uUE4epTcIjUrfOz/3c9WO1V+gRknQ9Uz15WSd5GQ0E1XshZcXKNjUbCO2OyLXv/In7MK 0IaGrOMk0CG+OlrOpbH+4TR1Yi4iViT6//yfFLE2JyKDdRqHFM+0H89aMy9gLYsXwAVz UD520T0S+mI5SDVWAxviWOFkDyeor0we48340RE/PcxrmnPnosGUvuDhIF8D1fmq0IAD 5+Zh1A1eqvjd5GZ8rnaAmpbYawxokP/00a7mqwbsNVaUhUggDIntIgZXOD/YfJMSPFbY HLJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=6FEOWuqF0659Id8WM0VMwisiZKNemzWx6+6zGIudvgk=; b=FMQ7AUWSiM9wSbabU3cMAI5azI+rn0He202TeildSGKOIURpiovCOjxLVn3ManLtFC +ooRKx6PeFUXHtWnvpaNuXjyrc/gtF9R0+v0fdSrfa7Ue73mIXqRnpFxufD3Y9O2JMT1 428dZICo1mpoCUP1RA5RRgqhm1G1JT6XnTjmxVznt+dKZPlav2tni3+cV5RfJ1SpOZJi cZx1F3JHQNHdPAzmTx4Mog/0ED3xrsEYmvQ75ZLVIQmWAxKEDS86NjszVsS1LLeO5M+x XnVe4KSo6JHE0KPbyJLScwWzlII4bmVpexh5VNFi1HXGUrtxjc7AT7jlTo3bSLUCRCAs Z1Rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="rp4s/cwT"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m128si11698227pfm.97.2019.06.11.00.20.34; Tue, 11 Jun 2019 00:20:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="rp4s/cwT"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404224AbfFKHUT (ORCPT + 99 others); Tue, 11 Jun 2019 03:20:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:52598 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404279AbfFKHUS (ORCPT ); Tue, 11 Jun 2019 03:20:18 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6854D2086D; Tue, 11 Jun 2019 07:20:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560237617; bh=A6Gg0KGw/+9WbdgZDB3FBl1rwLrEFluqXrCtKVr6q5Y=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=rp4s/cwTvhpotEafDiSCBxwwG57+Tz0FM/y63j/l51/Pvcd1VU0nP2Sg7UaM9/9uT +CGfIOgDoQ3hDtpBrh6w2lvzUNe/FQUONWZKQYQvf2BIVlTMS4e+L1fDf+y1k0+maB HQ23nMK4FbV2Oz+a0uepd2AngQUCG0iVo3pVraGQ= Date: Tue, 11 Jun 2019 09:20:10 +0200 From: Greg Kroah-Hartman To: Pavel Shilovskiy Cc: "linux-kernel@vger.kernel.org" , "stable@vger.kernel.org" , Christoph Probst , Steven French Subject: Re: [PATCH 4.4 041/241] cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() Message-ID: <20190611072010.GA10581@kroah.com> References: <20190609164147.729157653@linuxfoundation.org> <20190609164148.958546130@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 10, 2019 at 07:13:24PM +0000, Pavel Shilovskiy wrote: > > -----Original Message----- > From: Greg Kroah-Hartman > Sent: Sunday, June 9, 2019 9:40 AM > To: linux-kernel@vger.kernel.org > Cc: Greg Kroah-Hartman ; stable@vger.kernel.org; Christoph Probst ; Pavel Shilovskiy ; Steven French > Subject: [PATCH 4.4 041/241] cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() > > From: Christoph Probst > > commit 6a54b2e002c9d00b398d35724c79f9fe0d9b38fb upstream. > > Change strcat to strncpy in the "None" case to fix a buffer overflow when cinode->oplock is reset to 0 by another thread accessing the same cinode. It is never valid to append "None" to any other message. > > Consolidate multiple writes to cinode->oplock to reduce raciness. > > Signed-off-by: Christoph Probst > Reviewed-by: Pavel Shilovsky > Signed-off-by: Steve French > CC: Stable > Signed-off-by: Greg Kroah-Hartman > -------------------------------- > > Hi Greg, > > This patch has been queued for 4.4.y and has already been merged into > 5.1.y (5.1.5). Are you going to apply it to other stable kernels: 4.9, > 4.14, 4.19? It is already in the 4.9.179, 4.14.122, 4.19.46, 5.0.19, and 5.1.5 released kernels. So I don't think I can merge it into them again :) thanks, greg k-h