lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALGdzuozZOxkfitsGLx3aW1uE_AHGayrvu9_nub6As10WEtXgQ@mail.gmail.com>
Date: Mon, 27 Jan 2025 10:30:47 -0600
From: Chenyuan Yang <chenyuan0y@...il.com>
To: lee@...nel.org, lkundrak@...sk
Cc: linux-kernel@...r.kernel.org, zijie98@...il.com
Subject: Re: [PATCH] mfd: ene-kb3930: Fix potential NULL pointer dereference

Dear Developers,

I am writing to check if there has been any update on this issue.
Given that it involves a potential null pointer dereference, I believe
we should address it as soon as possible

Best,
Chenyuan

On Mon, Jan 20, 2025 at 1:07 PM Chenyuan Yang <chenyuan0y@...il.com> wrote:
>
> The off_gpios could be NULL. Add missing check in the kb3930_probe().
> This is similar to the issue fixed in commit
> b1ba8bcb2d1ffce11b308ce166c9cc28d989e3b9 ("backlight: hx8357:Fix potential NULL pointer dereference").
>
> Fixes: ede6b2d1dfc0 ("mfd: ene-kb3930: Add driver for ENE KB3930 Embedded Controller")
> Signed-off-by: Chenyuan Yang <chenyuan0y@...il.com>
> ---
>  drivers/mfd/ene-kb3930.c | 2 ++
>  1 file changed, 2 insertions(+)
>
> diff --git a/drivers/mfd/ene-kb3930.c b/drivers/mfd/ene-kb3930.c
> index fa0ad2f14a39..60824d847bf0 100644
> --- a/drivers/mfd/ene-kb3930.c
> +++ b/drivers/mfd/ene-kb3930.c
> @@ -162,6 +162,8 @@ static int kb3930_probe(struct i2c_client *client)
>                         devm_gpiod_get_array_optional(dev, "off", GPIOD_IN);
>                 if (IS_ERR(ddata->off_gpios))
>                         return PTR_ERR(ddata->off_gpios);
> +               if (!ddata->off_gpios)
> +                       return -ENOMEM;
>                 if (ddata->off_gpios->ndescs < 2) {
>                         dev_err(dev, "invalid off-gpios property\n");
>                         return -EINVAL;
> --
> 2.34.1
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ