In the Linux kernel, the following vulnerability has been resolved:smb: client: fix oops due to unset link speedIt isn't guaranteed that NETWORK_INTERFACE_INFO::LinkSpeed will alwaysbe set by the server, so the client must handle any values and thenprevent oopses like below from happening:Oops: divide error: 0000 [#1] PREEMPT SMP KASAN NOPTICPU: 0 UID: 0 PID: 1323 Comm: cat Not tainted 6.13.0-rc7 #2Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-3.fc4104/01/2014RIP: 0010:cifs_debug_data_proc_show+0xa45/0x1460 [cifs] Code: 00 00 4889 df e8 3b cd 1b c1 41 f6 44 24 2c 04 0f 84 50 01 00 00 48 89 ef e8e7 d0 1b c1 49 8b 44 24 18 31 d2 49 8d 7c 24 28 <48> f7 74 24 18 48 89c3 e8 6e cf 1b c1 41 8b 6c 24 28 49 8d 7c 24RSP: 0018:ffffc90001817be0 EFLAGS: 00010246RAX: 0000000000000000 RBX: ffff88811230022c RCX: ffffffffc041bd99RDX: 0000000000000000 RSI: 0000000000000567 RDI: ffff888112300228RBP: ffff888112300218 R08: fffff52000302f5f R09: ffffed1022fa58acR10: ffff888117d2c566 R11: 00000000fffffffe R12: ffff888112300200R13: 000000012a15343f R14: 0000000000000001 R15: ffff888113f2db58FS: 00007fe27119e740(0000) GS:ffff888148600000(0000)knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 00007fe2633c5000 CR3: 0000000124da0000 CR4: 0000000000750ef0PKRU: 55555554Call Trace:
No PoCs from references.
- https://github.com/w4zu/Debian_security