lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20100306110445.GC4958@bicker> Date: Sat, 6 Mar 2010 14:04:45 +0300 From: Dan Carpenter <error27@...il.com> To: netdev@...r.kernel.org Cc: Eric Dumazet <eric.dumazet@...il.com>, Jan Engelhardt <jengelh@...ozas.de>, Ingo Molnar <mingo@...e.hu>, "David S. Miller" <davem@...emloft.net>, Andrew Morton <akpm@...ux-foundation.org>, linux-kernel@...r.kernel.org, kernel-janitors@...r.kernel.org Subject: [patch] sock.c: potential null dereference We test that "prot->rsk_prot" is non-null right before we dereference it on this line. Signed-off-by: Dan Carpenter <error27@...il.com> diff --git a/net/core/sock.c b/net/core/sock.c index fcd397a..fa427b5 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -2276,7 +2276,8 @@ out_free_request_sock_slab: prot->rsk_prot->slab = NULL; } out_free_request_sock_slab_name: - kfree(prot->rsk_prot->slab_name); + if (prot->rsk_prot) + kfree(prot->rsk_prot->slab_name); out_free_sock_slab: kmem_cache_destroy(prot->slab); prot->slab = NULL; -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists