cifs: ntstatus_to_dos_map[] is not terminated
authorTim Gardner <tim.gardner@canonical.com>
Sun, 13 Oct 2013 19:29:03 +0000 (13:29 -0600)
committerSteve French <smfrench@gmail.com>
Mon, 14 Oct 2013 17:14:01 +0000 (12:14 -0500)
commit0c26606cbe4937f2228a27bb0c2cad19855be87a
treea6750a3f37ce363f9019a4a41e65384ab7383d4a
parentdde2356c8466298bd77fa699e0ea296372eed47b
cifs: ntstatus_to_dos_map[] is not terminated

Functions that walk the ntstatus_to_dos_map[] array could
run off the end. For example, ntstatus_to_dos() loops
while ntstatus_to_dos_map[].ntstatus is not 0. Granted,
this is mostly theoretical, but could be used as a DOS attack
if the error code in the SMB header is bogus.

[Might consider adding to stable, as this patch is low risk - Steve]

Reviewed-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
Signed-off-by: Steve French <smfrench@gmail.com>
fs/cifs/netmisc.c