On Fri, 19 Oct 2012 15:58:15 -0400 Jeff Layton <jlayton@xxxxxxxxxx> wrote: > Now that we aren't so rigid about the length of the key being passed > in, we need to be a bit more rigorous about checking the length of > the actual data against the claimed length (a'la num_subauths field). > > Check for the case where userspace sends us a seemingly valid key > with a num_subauths field that goes beyond the end of the array. If > that happens, return -EIO and invalidate the key. > > Also change the other places where we check for malformed keys in this > code to invalidate the key as well. > > Signed-off-by: Jeff Layton <jlayton@xxxxxxxxxx> > --- > fs/cifs/cifsacl.c | 20 ++++++++++++++++++-- > 1 file changed, 18 insertions(+), 2 deletions(-) > Gyah -- sorry. git-send-email misfire...Please ignore this one. -- Jeff Layton <jlayton@xxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html