[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFB9KM3==40uUXxxOD_CD09zFPj3Fmr-Brt7x4SZj86NTf3_vg@mail.gmail.com>
Date: Sat, 21 Mar 2015 21:10:46 -0500
From: Scott Lovenberg <scott.lovenberg@...il.com>
To: Taesoo Kim <tsgatesv@...il.com>
Cc: "sfrench@...ba.org" <sfrench@...ba.org>,
linux-cifs <linux-cifs@...r.kernel.org>,
samba-technical@...ts.samba.org,
LKML <linux-kernel@...r.kernel.org>, taesoo@...ech.edu,
changwoo@...ech.edu, sanidhya@...ech.edu, blee@...ech.edu,
csong84@...ech.edu
Subject: Re: [PATCH 1/1] cifs: potential memory leaks when parsing mnt opts
On Sat, Mar 21, 2015 at 6:08 PM, Taesoo Kim <tsgatesv@...il.com> wrote:
> Althouhg mkfs.cifs in userspace performs a bit of sanitization
> (e.g., forcing one user option), current implementation is not
> robust. Other options such as iocharset and domainanme are similary
> vulnerable.
>
I assume you mean mount.cifs? :-) Anyways, good catch.
--
Peace and Blessings,
-Scott.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists