Reported by Brad at Apple (not allowed to submit this bug himself due to corporate policy): The following smb.conf configuration file was used to create a Samba server with a malicious share name: [/../../../../../../../../../../../../../../../../var/mobile/foobar] read only = yes browsable = yes guest account = thijs locking = no path = /tmp/smb guest ok = yes Not a security hole, as anyone who can modify smb.conf on a server has multiple ways of being root. But we should probably disallow '/' components in share names.