[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170322193945.GK32449@mwanda>
Date: Wed, 22 Mar 2017 22:39:45 +0300
From: Dan Carpenter <dan.carpenter@...cle.com>
To: Colin King <colin.king@...onical.com>
Cc: Johannes Thumshirn <jth@...nel.org>,
"James E . J . Bottomley" <jejb@...ux.vnet.ibm.com>,
"Martin K . Petersen" <martin.petersen@...cle.com>,
fcoe-devel@...n-fcoe.org, linux-scsi@...r.kernel.org,
kernel-janitors@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] scsi: fcoe: sanity check string size for store_ctrl_mode
option
On Wed, Mar 22, 2017 at 02:01:37PM +0000, Colin King wrote:
> From: Colin Ian King <colin.king@...onical.com>
>
> Reading and writing to mode[count - 1] implies the count should not
> be less than 1 so add a sanity check for this.
>
> Detected with CoverityScan, CID#1357345 ("Overflowed array index write")
>
> Signed-off-by: Colin Ian King <colin.king@...onical.com>
This is harmless, of course, but count can't be zero. This is a sysfs
file so we test for zero size writes in sysfs_kf_write() and return
early.
regards,
dan carpenter
Powered by blists - more mailing lists