Re: [PATCH 10/9] cifs: extra sanity checking for cifs.idmap keys

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 19 Oct 2012 15:58:15 -0400
Jeff Layton <jlayton@xxxxxxxxxx> wrote:

> Now that we aren't so rigid about the length of the key being passed
> in, we need to be a bit more rigorous about checking the length of
> the actual data against the claimed length (a'la num_subauths field).
> 
> Check for the case where userspace sends us a seemingly valid key
> with a num_subauths field that goes beyond the end of the array. If
> that happens, return -EIO and invalidate the key.
> 
> Also change the other places where we check for malformed keys in this
> code to invalidate the key as well.
> 
> Signed-off-by: Jeff Layton <jlayton@xxxxxxxxxx>
> ---
>  fs/cifs/cifsacl.c | 20 ++++++++++++++++++--
>  1 file changed, 18 insertions(+), 2 deletions(-)
> 

Gyah -- sorry. git-send-email misfire...Please ignore this one.
-- 
Jeff Layton <jlayton@xxxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux