lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20231211031336.235634-1-chentao@kylinos.cn> Date: Mon, 11 Dec 2023 11:13:36 +0800 From: Kunwu Chan <chentao@...inos.cn> To: jesse.brandeburg@...el.com, anthony.l.nguyen@...el.com, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com Cc: jacob.e.keller@...el.com, przemyslaw.kitszel@...el.com, intel-wired-lan@...ts.osuosl.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, Kunwu Chan <chentao@...inos.cn>, Kunwu Chan <kunwu.chan@...mail.com> Subject: [PATCH] igb: Add null pointer check to igb_set_fw_version kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Fixes: 1978d3ead82c ("intel: fix string truncation warnings") Cc: Kunwu Chan <kunwu.chan@...mail.com> Signed-off-by: Kunwu Chan <chentao@...inos.cn> --- drivers/net/ethernet/intel/igb/igb_main.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/ethernet/intel/igb/igb_main.c b/drivers/net/ethernet/intel/igb/igb_main.c index b2295caa2f0a..6838f6fccb80 100644 --- a/drivers/net/ethernet/intel/igb/igb_main.c +++ b/drivers/net/ethernet/intel/igb/igb_main.c @@ -3102,6 +3102,8 @@ void igb_set_fw_version(struct igb_adapter *adapter) break; } + if (!lbuf) + return; /* the truncate happens here if it doesn't fit */ strscpy(adapter->fw_version, lbuf, sizeof(adapter->fw_version)); kfree(lbuf); -- 2.39.2
Powered by blists - more mailing lists