lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070319123438.GE14519@thunk.org> Date: Mon, 19 Mar 2007 08:34:38 -0400 From: Theodore Tso <tytso@....edu> To: "Brian D. Behlendorf" <behlendorf1@...l.gov> Cc: linux-ext4@...r.kernel.org, adilger@...sterfs.com, wartens2@...l.gov Subject: Re: e2fsprogs coverity patch <cid-05.diff> On Fri, Feb 09, 2007 at 06:11:41PM -0800, Brian D. Behlendorf wrote: > array is initially set to NULL, so it is possible that readdir() will return > NULL and leave array set to NULL. Thus we do need to check if array is NULL or > check if num != 0. > > Coverity ID: 5: Forward NULL This wasn't the only bug; it turns out that if /etc/e2fsck.conf or /etc/mke2fs.conf is an empty directory, then your patch would fix this segfault, only for it to segfault later in profile_init(). I'll fix this before I commit. - Ted - To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists