From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: cifs: Fix buffer overflow when parsing NFS reparse points - Issue: A buffer overflow may occur when parsing NFS reparse points. 2. Fixes Implemented: - Code Change: Fixed the function, which previously did not subtract the size of when accessing the buffer. - Check: Added a check on before accessing to prevent invalid memory access. - Check: Added a size check on the before calling . 3. Scope of Fix: - File: - Lines Modified: 15 changes in total, including 14 insertions and 1 deletion. 4. Contributors: - Author: Pali Rohár - Committer: Greg Kroah-Hartman - Sign-off: Pali Rohár , Steve French , Sasha Levin 5. Related Patches and Reviews: - Patch: d5ecebc4900d ("smb3: Allow query of symlinks stored as reparse points") - Reviews: Reviewed by Paulo Alcantara (Red Hat) , Steve French , Sasha Levin . This information indicates that the vulnerability was addressed by fixing a buffer overflow during the parsing of NFS reparse points, with code modifications and additional checks to prevent invalid memory access.