In the Linux kernel, the following vulnerability has been resolved:
cifs: Return correct error code from smb2getenc_key
Avoid a warning if the error percolates back up:
[440700.376476] CIFS VFS: \otters.example.com cryptmessage: Could not get encryption key [440700.386947] ------------[ cut here ]------------ [440700.386948] err = 1 [440700.386977] WARNING: CPU: 11 PID: 2733 at /build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseqset+0x5c/0x70 ... [440700.397304] CPU: 11 PID: 2733 Comm: tar Tainted: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu ... [440700.397334] Call Trace: [440700.397346] __filemapsetwb_err+0x1a/0x70 [440700.397419] cifswritepages+0x9c7/0xb30 [cifs] [440700.397426] dowritepages+0x4b/0xe0 [440700.397444] __filemapfdatawriterange+0xcb/0x100 [440700.397455] filemap_writeandwait+0x42/0xa0 [440700.397486] cifssetattr+0x68b/0xf30 [cifs] [440700.397493] notifychange+0x358/0x4a0 [440700.397500] utimescommon+0xe9/0x1c0 [440700.397510] doutimes+0xc5/0x150 [440700.397520] __x64sysutimensat+0x88/0xd0
[
{
"events": [
{
"introduced": "4.11"
},
{
"fixed": "4.14.233"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.191"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.118"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.36"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.11.20"
}
]
},
{
"events": [
{
"introduced": "5.12"
},
{
"fixed": "5.12.3"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-46960.json"