lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20210630082724.50838-12-wuguanghao3@huawei.com> Date: Wed, 30 Jun 2021 16:27:23 +0800 From: wuguanghao <wuguanghao3@...wei.com> To: <linux-ext4@...r.kernel.org>, <artem.blagodarenko@...il.com> CC: <liuzhiqiang26@...wei.com>, <linfeilong@...wei.com>, <wuguanghao3@...wei.com> Subject: [PATCH v2 11/12] misc/lsattr: check whether path is NULL in lsattr_dir_proc() From: Zhiqiang Liu <liuzhiqiang26@...wei.com> In lsattr_dir_proc(), if malloc() return NULL, it will cause a segmentation fault problem. Signed-off-by: Zhiqiang Liu <liuzhiqiang26@...wei.com> Signed-off-by: Wu Guanghao <wuguanghao3@...wei.com> --- misc/lsattr.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/misc/lsattr.c b/misc/lsattr.c index 0d954376..f3212069 100644 --- a/misc/lsattr.c +++ b/misc/lsattr.c @@ -144,6 +144,12 @@ static int lsattr_dir_proc (const char * dir_name, struct dirent * de, int dir_len = strlen(dir_name); path = malloc(dir_len + strlen (de->d_name) + 2); + if (!path) { + fprintf(stderr, "%s", + _("Couldn't allocate path variable " + "in lsattr_dir_proc")); + return -1; + } if (dir_len && dir_name[dir_len-1] == '/') sprintf (path, "%s%s", dir_name, de->d_name); -- 2.19.1
Powered by blists - more mailing lists