Sorry for not following up here, I've been quite busy recently.

So there are two bugs here - the first one, strcat overflow, is solved
by my test kernel or by your patch.

Though I am not sure it's totally correct, I'll raise my concern on
mailing list.

The second bug, null pointer dereference, requires more investigation.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824981

Title:
  cifs set_oplock buffer overflow in strcat

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824981/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to