Comment 17 for bug 1824981

Revision history for this message
Christoph Probst (christophprobst) wrote :

There is now a kernel patch for cifs that is supposed to fix the buffer overflow in strcat.

Details see https://patchwork.kernel.org/patch/10931327/

An alternative workaround is to downgrade the connection to SMB2 (mount option vers=2.0) as the bug only affects SMB2.1 and SMB3 code.

Regarding the second issue (BUG: unable to handle kernel NULL pointer dereference at 0000000000000038) it is likely that it is triggered by a racecondition aswell, which isn't yet fixed.