lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 29 Jan 2013 20:00:05 +0000
From:	Scan Subscription <scan-subscription@...erity.com>
To:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
CC:	"John W. Linville" <linville@...driver.com>
Subject: New Defect(s) reported by Coverity Scan 

Hi,

Please find the latest report on new defect(s) that have been introduced to the Linux Kernel found with Coverity SCAN. 


Defect(s) Reported-by: Coverity Scan:
___________________________________________________________________________
** CID 967920: Allocation too small for type (SIZECHECK)
/drivers/net/wireless/ath/wil6210/pcie_bus.c: 146
http://scan5.coverity.com:8080/sourcebrowser.htm?projectId=10063#mergedDefectId=967920



###########################################################################
Defect Details:
___________________________________________________________________________
CID 967920: Allocation too small for type (SIZECHECK)
http://scan5.coverity.com:8080/sourcebrowser.htm?projectId=10063#mergedDefectId=967920

/drivers/net/wireless/ath/wil6210/pcie_bus.c: 146 ( buffer_alloc)
   143    	/* rollback to err_iounmap */
   144    	dev_info(&pdev->dev, "CSR at %pR -> %p\n", &pdev->resource[0], csr);
   145    
>>> "wil_if_alloc(dev, csr)" allocates memory.
   146    	wil = wil_if_alloc(dev, csr);
   147    	if (IS_ERR(wil)) {
   148    		rc = (int)PTR_ERR(wil);
   149    		dev_err(dev, "wil_if_alloc failed: %d\n", rc);
   150    		goto err_iounmap;
  

/drivers/net/wireless/ath/wil6210/pcie_bus.c: 146 ( size_error)
   143    	/* rollback to err_iounmap */
   144    	dev_info(&pdev->dev, "CSR at %pR -> %p\n", &pdev->resource[0], csr);
   145    
>>> CID 967920: Allocation too small for type (SIZECHECK) Allocating 920 
>>> bytes to pointer of type struct wil6210_priv, which needs at least 2304 bytes.
   146    	wil = wil_if_alloc(dev, csr);
   147    	if (IS_ERR(wil)) {
   148    		rc = (int)PTR_ERR(wil);
   149    		dev_err(dev, "wil_if_alloc failed: %d\n", rc);
   150    		goto err_iounmap;
  
________________________________________________________________________


To view the defects in Coverity Scan visit, http://scan5.coverity.com:8080.  
Your username should be the first part of your email address. If you don't have a username, you can request one by emailing: scan-admin at coverity.com
	
Thank you,
Dakshesh Vyas
Coverity SCAN-ADMIN
scan-admin at coverity.com
http://scan.coverity.com

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ