* [patch] cifs: integer overflow in parse_dacl()
@ 2012-01-11 7:46 Dan Carpenter
[not found] ` <20120111074627.GA4519-mgFCXtclrQlZLf2FXnZxJA@public.gmane.org>
0 siblings, 1 reply; 10+ messages in thread
From: Dan Carpenter @ 2012-01-11 7:46 UTC (permalink / raw)
To: Steve French
Cc: linux-cifs-u79uwXL29TY76Z2rM5mHXA,
samba-technical-w/Ol4Ecudpl8XjKLYN78aQ,
kernel-janitors-u79uwXL29TY76Z2rM5mHXA
On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow
leading to a smaller ppace buffer than we expected.
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c
index 72ddf23..c1b2544 100644
--- a/fs/cifs/cifsacl.c
+++ b/fs/cifs/cifsacl.c
@@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl,
umode_t group_mask = S_IRWXG;
umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO;
+ if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *))
+ return;
ppace = kmalloc(num_aces * sizeof(struct cifs_ace *),
GFP_KERNEL);
if (!ppace) {
^ permalink raw reply related [flat|nested] 10+ messages in thread[parent not found: <20120111074627.GA4519-mgFCXtclrQlZLf2FXnZxJA@public.gmane.org>]
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <20120111074627.GA4519-mgFCXtclrQlZLf2FXnZxJA@public.gmane.org> @ 2012-01-11 12:20 ` Jeff Layton [not found] ` <20120111072029.672dfdca-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 2012-01-11 15:50 ` Shirish Pargaonkar 2012-01-12 19:17 ` Steve French 2 siblings, 1 reply; 10+ messages in thread From: Jeff Layton @ 2012-01-11 12:20 UTC (permalink / raw) To: Dan Carpenter Cc: Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA On Wed, 11 Jan 2012 10:46:27 +0300 Dan Carpenter <dan.carpenter@oracle.com> wrote: > On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow > leading to a smaller ppace buffer than we expected. > > Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> > > diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c > index 72ddf23..c1b2544 100644 > --- a/fs/cifs/cifsacl.c > +++ b/fs/cifs/cifsacl.c > @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, > umode_t group_mask = S_IRWXG; > umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; > > + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) > + return; > ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), > GFP_KERNEL); > if (!ppace) { Looks plausible. This function could use some work. I'm not sure why num_aces is signed here too... The first arg to kmalloc is a size_t. Does that boil down to an unsigned long on all arches? -- Jeff Layton <jlayton@samba.org> ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <20120111072029.672dfdca-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org>]
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <20120111072029.672dfdca-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> @ 2012-01-11 12:41 ` Dan Carpenter 2012-01-11 13:33 ` Jeff Layton 0 siblings, 1 reply; 10+ messages in thread From: Dan Carpenter @ 2012-01-11 12:41 UTC (permalink / raw) To: Jeff Layton Cc: Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA [-- Attachment #1: Type: text/plain, Size: 1668 bytes --] On Wed, Jan 11, 2012 at 07:20:29AM -0500, Jeff Layton wrote: > On Wed, 11 Jan 2012 10:46:27 +0300 > Dan Carpenter <dan.carpenter@oracle.com> wrote: > > > On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow > > leading to a smaller ppace buffer than we expected. > > > > Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> > > > > diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c > > index 72ddf23..c1b2544 100644 > > --- a/fs/cifs/cifsacl.c > > +++ b/fs/cifs/cifsacl.c > > @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, > > umode_t group_mask = S_IRWXG; > > umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; > > > > + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) > > + return; > > ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), > > GFP_KERNEL); > > if (!ppace) { > > > Looks plausible. This function could use some work. I'm not sure why > num_aces is signed here too... > > The first arg to kmalloc is a size_t. Does that boil down to an unsigned > long on all arches? People have been submitting a lot of patches recently based on that assumption. It matches the check in kcalloc() as well. According to include/asm-generic/posix_types.h: /* * Most 32 bit architectures use "unsigned int" size_t, * and all 64 bit architectures use "unsigned long" size_t. */ It would be better to user a lower limit, but I don't know the code well enough to say if which one is good that won't break things... A high number can trigger a kmalloc() failure and that puts annoying spam in the dmesg. regards, dan carpenter [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [patch] cifs: integer overflow in parse_dacl() 2012-01-11 12:41 ` Dan Carpenter @ 2012-01-11 13:33 ` Jeff Layton 0 siblings, 0 replies; 10+ messages in thread From: Jeff Layton @ 2012-01-11 13:33 UTC (permalink / raw) To: Dan Carpenter Cc: Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA [-- Attachment #1: Type: text/plain, Size: 1923 bytes --] On Wed, 11 Jan 2012 15:41:32 +0300 Dan Carpenter <dan.carpenter@oracle.com> wrote: > On Wed, Jan 11, 2012 at 07:20:29AM -0500, Jeff Layton wrote: > > On Wed, 11 Jan 2012 10:46:27 +0300 > > Dan Carpenter <dan.carpenter@oracle.com> wrote: > > > > > On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow > > > leading to a smaller ppace buffer than we expected. > > > > > > Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> > > > > > > diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c > > > index 72ddf23..c1b2544 100644 > > > --- a/fs/cifs/cifsacl.c > > > +++ b/fs/cifs/cifsacl.c > > > @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, > > > umode_t group_mask = S_IRWXG; > > > umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; > > > > > > + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) > > > + return; > > > ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), > > > GFP_KERNEL); > > > if (!ppace) { > > > > > > Looks plausible. This function could use some work. I'm not sure why > > num_aces is signed here too... > > > > The first arg to kmalloc is a size_t. Does that boil down to an unsigned > > long on all arches? > > People have been submitting a lot of patches recently based on that > assumption. It matches the check in kcalloc() as well. According > to include/asm-generic/posix_types.h: > > /* > * Most 32 bit architectures use "unsigned int" size_t, > * and all 64 bit architectures use "unsigned long" size_t. > */ > > It would be better to user a lower limit, but I don't know the code > well enough to say if which one is good that won't break things... > A high number can trigger a kmalloc() failure and that puts annoying > spam in the dmesg. > > regards, > dan carpenter Ok, thanks. In that case... Acked-by: Jeff Layton <jlayton@samba.org> [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <20120111074627.GA4519-mgFCXtclrQlZLf2FXnZxJA@public.gmane.org> 2012-01-11 12:20 ` Jeff Layton @ 2012-01-11 15:50 ` Shirish Pargaonkar [not found] ` <CADT32eLVwQT9V67BX8TkjVHDnQoYS7OqA_-xbnjY57ZXO3EfsA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> 2012-01-12 19:17 ` Steve French 2 siblings, 1 reply; 10+ messages in thread From: Shirish Pargaonkar @ 2012-01-11 15:50 UTC (permalink / raw) To: Dan Carpenter Cc: Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA On Wed, Jan 11, 2012 at 1:46 AM, Dan Carpenter <dan.carpenter@oracle.com> wrote: > On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow > leading to a smaller ppace buffer than we expected. > > Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> > > diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c > index 72ddf23..c1b2544 100644 > --- a/fs/cifs/cifsacl.c > +++ b/fs/cifs/cifsacl.c > @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, > umode_t group_mask = S_IRWXG; > umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; > > + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) Should an error/warning (like cifs client can't handle these many aces or possible erroneous number of aces sent by server etc.) be logged before returning? > + return; > ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), > GFP_KERNEL); > if (!ppace) { > -- > To unsubscribe from this list: send the line "unsubscribe linux-cifs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <CADT32eLVwQT9V67BX8TkjVHDnQoYS7OqA_-xbnjY57ZXO3EfsA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>]
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <CADT32eLVwQT9V67BX8TkjVHDnQoYS7OqA_-xbnjY57ZXO3EfsA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> @ 2012-01-11 17:24 ` Steve French [not found] ` <CAH2r5muDQUL=0HcoFHH3QvP7C2pyy0=S9ESFBcm=qOYg3ESdxQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> 0 siblings, 1 reply; 10+ messages in thread From: Steve French @ 2012-01-11 17:24 UTC (permalink / raw) To: Shirish Pargaonkar Cc: Dan Carpenter, Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA On Wed, Jan 11, 2012 at 9:50 AM, Shirish Pargaonkar <shirishpargaonkar@gmail.com> wrote: > On Wed, Jan 11, 2012 at 1:46 AM, Dan Carpenter <dan.carpenter@oracle.com> wrote: >> On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow >> leading to a smaller ppace buffer than we expected. >> >> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> >> >> diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c >> index 72ddf23..c1b2544 100644 >> --- a/fs/cifs/cifsacl.c >> +++ b/fs/cifs/cifsacl.c >> @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, >> umode_t group_mask = S_IRWXG; >> umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; >> >> + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) > > Should an error/warning (like cifs client can't handle these many aces or > possible erroneous number of aces sent by server etc.) be logged before > returning? > >> + return; >> ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), >> GFP_KERNEL); >> if (!ppace) { Perhaps. Also note that you would overflow maximum smb size if num aces is huge so would you have even gotten this far? -- Thanks, Steve -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <CAH2r5muDQUL=0HcoFHH3QvP7C2pyy0=S9ESFBcm=qOYg3ESdxQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>]
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <CAH2r5muDQUL=0HcoFHH3QvP7C2pyy0=S9ESFBcm=qOYg3ESdxQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> @ 2012-01-11 18:20 ` Jeff Layton [not found] ` <20120111132053.467e8cae-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> 0 siblings, 1 reply; 10+ messages in thread From: Jeff Layton @ 2012-01-11 18:20 UTC (permalink / raw) To: Steve French Cc: Shirish Pargaonkar, Dan Carpenter, Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA On Wed, 11 Jan 2012 11:24:03 -0600 Steve French <smfrench@gmail.com> wrote: > On Wed, Jan 11, 2012 at 9:50 AM, Shirish Pargaonkar > <shirishpargaonkar@gmail.com> wrote: > > On Wed, Jan 11, 2012 at 1:46 AM, Dan Carpenter <dan.carpenter@oracle.com> wrote: > >> On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow > >> leading to a smaller ppace buffer than we expected. > >> > >> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> > >> > >> diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c > >> index 72ddf23..c1b2544 100644 > >> --- a/fs/cifs/cifsacl.c > >> +++ b/fs/cifs/cifsacl.c > >> @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, > >> umode_t group_mask = S_IRWXG; > >> umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; > >> > >> + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) > > > > Should an error/warning (like cifs client can't handle these many aces or > > possible erroneous number of aces sent by server etc.) be logged before > > returning? > > > >> + return; > >> ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), > >> GFP_KERNEL); > >> if (!ppace) { > > Perhaps. Also note that you would overflow maximum smb size if num > aces is huge > so would you have even gotten this far? > Only if the smb frame is properly formed. It's possible that it's corrupt in such a way that the num_aces field is much larger than it should be, but the rest of the frame looks OK. -- Jeff Layton <jlayton@samba.org> ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <20120111132053.467e8cae-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org>]
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <20120111132053.467e8cae-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org> @ 2012-01-11 18:31 ` Steve French [not found] ` <CAH2r5msciOkxvxTrQrN9mKKCiJvM_anmxU7sag_TGk92LoKEwQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> 0 siblings, 1 reply; 10+ messages in thread From: Steve French @ 2012-01-11 18:31 UTC (permalink / raw) To: Jeff Layton Cc: Shirish Pargaonkar, Dan Carpenter, Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA We could calculate max_aces based on a minimum sized ace and maximum smb frame size (which would be 64K presumably for Windows for non-Writes, but larger for Samba), but not sure if it is worth the trouble unless you find a path where we would parse beyond end of frame, On Wed, Jan 11, 2012 at 12:20 PM, Jeff Layton <jlayton@samba.org> wrote: > On Wed, 11 Jan 2012 11:24:03 -0600 > Steve French <smfrench@gmail.com> wrote: > >> On Wed, Jan 11, 2012 at 9:50 AM, Shirish Pargaonkar >> <shirishpargaonkar@gmail.com> wrote: >> > On Wed, Jan 11, 2012 at 1:46 AM, Dan Carpenter <dan.carpenter@oracle.com> wrote: >> >> On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow >> >> leading to a smaller ppace buffer than we expected. >> >> >> >> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> >> >> >> >> diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c >> >> index 72ddf23..c1b2544 100644 >> >> --- a/fs/cifs/cifsacl.c >> >> +++ b/fs/cifs/cifsacl.c >> >> @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, >> >> umode_t group_mask = S_IRWXG; >> >> umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; >> >> >> >> + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) >> > >> > Should an error/warning (like cifs client can't handle these many aces or >> > possible erroneous number of aces sent by server etc.) be logged before >> > returning? >> > >> >> + return; >> >> ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), >> >> GFP_KERNEL); >> >> if (!ppace) { >> >> Perhaps. Also note that you would overflow maximum smb size if num >> aces is huge >> so would you have even gotten this far? >> > > Only if the smb frame is properly formed. It's possible that it's > corrupt in such a way that the num_aces field is much larger than it > should be, but the rest of the frame looks OK. > > -- > Jeff Layton <jlayton@samba.org> -- Thanks, Steve -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
[parent not found: <CAH2r5msciOkxvxTrQrN9mKKCiJvM_anmxU7sag_TGk92LoKEwQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>]
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <CAH2r5msciOkxvxTrQrN9mKKCiJvM_anmxU7sag_TGk92LoKEwQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org> @ 2012-01-12 7:06 ` Dan Carpenter 0 siblings, 0 replies; 10+ messages in thread From: Dan Carpenter @ 2012-01-12 7:06 UTC (permalink / raw) To: Steve French Cc: Jeff Layton, Shirish Pargaonkar, Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA [-- Attachment #1: Type: text/plain, Size: 618 bytes --] On Wed, Jan 11, 2012 at 12:31:34PM -0600, Steve French wrote: > We could calculate max_aces based on a minimum sized ace and maximum > smb frame size (which would be 64K presumably for Windows for > non-Writes, but larger for Samba), but not sure if it is worth the > trouble unless you find a path where we would parse beyond end of > frame, This was a static checker test and I haven't tried to exploit it. You guys are more familiar with the code obviously and you've lost me with the talk about max_aces. I don't see that anywhere in the code... $ grep max_aces fs/cifs/ -iR | wc -l 0 regards, dan carpenter [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [patch] cifs: integer overflow in parse_dacl() [not found] ` <20120111074627.GA4519-mgFCXtclrQlZLf2FXnZxJA@public.gmane.org> 2012-01-11 12:20 ` Jeff Layton 2012-01-11 15:50 ` Shirish Pargaonkar @ 2012-01-12 19:17 ` Steve French 2 siblings, 0 replies; 10+ messages in thread From: Steve French @ 2012-01-12 19:17 UTC (permalink / raw) To: Dan Carpenter Cc: Steve French, linux-cifs-u79uwXL29TY76Z2rM5mHXA, samba-technical-w/Ol4Ecudpl8XjKLYN78aQ, kernel-janitors-u79uwXL29TY76Z2rM5mHXA Merged into cifs-2.6.git On Wed, Jan 11, 2012 at 1:46 AM, Dan Carpenter <dan.carpenter@oracle.com> wrote: > On 32 bit systems num_aces * sizeof(struct cifs_ace *) could overflow > leading to a smaller ppace buffer than we expected. > > Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> > > diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c > index 72ddf23..c1b2544 100644 > --- a/fs/cifs/cifsacl.c > +++ b/fs/cifs/cifsacl.c > @@ -909,6 +909,8 @@ static void parse_dacl(struct cifs_acl *pdacl, char *end_of_acl, > umode_t group_mask = S_IRWXG; > umode_t other_mask = S_IRWXU | S_IRWXG | S_IRWXO; > > + if (num_aces > ULONG_MAX / sizeof(struct cifs_ace *)) > + return; > ppace = kmalloc(num_aces * sizeof(struct cifs_ace *), > GFP_KERNEL); > if (!ppace) { > -- > To unsubscribe from this list: send the line "unsubscribe linux-cifs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- Thanks, Steve -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2012-01-12 19:17 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-01-11 7:46 [patch] cifs: integer overflow in parse_dacl() Dan Carpenter
[not found] ` <20120111074627.GA4519-mgFCXtclrQlZLf2FXnZxJA@public.gmane.org>
2012-01-11 12:20 ` Jeff Layton
[not found] ` <20120111072029.672dfdca-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org>
2012-01-11 12:41 ` Dan Carpenter
2012-01-11 13:33 ` Jeff Layton
2012-01-11 15:50 ` Shirish Pargaonkar
[not found] ` <CADT32eLVwQT9V67BX8TkjVHDnQoYS7OqA_-xbnjY57ZXO3EfsA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2012-01-11 17:24 ` Steve French
[not found] ` <CAH2r5muDQUL=0HcoFHH3QvP7C2pyy0=S9ESFBcm=qOYg3ESdxQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2012-01-11 18:20 ` Jeff Layton
[not found] ` <20120111132053.467e8cae-9yPaYZwiELC+kQycOl6kW4xkIHaj4LzF@public.gmane.org>
2012-01-11 18:31 ` Steve French
[not found] ` <CAH2r5msciOkxvxTrQrN9mKKCiJvM_anmxU7sag_TGk92LoKEwQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2012-01-12 7:06 ` Dan Carpenter
2012-01-12 19:17 ` Steve French
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox