CVE-2021-46960

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2024
Last modified:
11/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Return correct error code from smb2_get_enc_key<br /> <br /> Avoid a warning if the error percolates back up:<br /> <br /> [440700.376476] CIFS VFS: \\otters.example.com crypt_message: Could not get encryption key<br /> [440700.386947] ------------[ cut here ]------------<br /> [440700.386948] err = 1<br /> [440700.386977] WARNING: CPU: 11 PID: 2733 at /build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70<br /> ...<br /> [440700.397304] CPU: 11 PID: 2733 Comm: tar Tainted: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu<br /> ...<br /> [440700.397334] Call Trace:<br /> [440700.397346] __filemap_set_wb_err+0x1a/0x70<br /> [440700.397419] cifs_writepages+0x9c7/0xb30 [cifs]<br /> [440700.397426] do_writepages+0x4b/0xe0<br /> [440700.397444] __filemap_fdatawrite_range+0xcb/0x100<br /> [440700.397455] filemap_write_and_wait+0x42/0xa0<br /> [440700.397486] cifs_setattr+0x68b/0xf30 [cifs]<br /> [440700.397493] notify_change+0x358/0x4a0<br /> [440700.397500] utimes_common+0xe9/0x1c0<br /> [440700.397510] do_utimes+0xc5/0x150<br /> [440700.397520] __x64_sys_utimensat+0x88/0xd0

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.11 (including) 4.14.233 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.191 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.118 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.36 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.11.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.12.3 (excluding)