cifs: ntstatus_to_dos_map[] is not terminated
authorTim Gardner <tim.gardner@canonical.com>
Sun, 13 Oct 2013 19:29:03 +0000 (13:29 -0600)
committerSteve French <smfrench@gmail.com>
Mon, 14 Oct 2013 17:14:01 +0000 (12:14 -0500)
Functions that walk the ntstatus_to_dos_map[] array could
run off the end. For example, ntstatus_to_dos() loops
while ntstatus_to_dos_map[].ntstatus is not 0. Granted,
this is mostly theoretical, but could be used as a DOS attack
if the error code in the SMB header is bogus.

[Might consider adding to stable, as this patch is low risk - Steve]

Reviewed-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
Signed-off-by: Steve French <smfrench@gmail.com>

No differences found