diff options
author | Jeff Layton <jlayton@poochiereds.net> | 2014-05-23 12:53:10 +0200 |
---|---|---|
committer | Steve French <smfrench@gmail.com> | 2014-05-21 19:38:01 +0200 |
commit | 08b37d518af365e7a52fe11320ea683856407581 (patch) | |
tree | fe0f0dc3c4c39290ac8ed1b2467c38ede37a393a /virt/kvm | |
parent | Clarify SMB2/SMB3 create context and add missing ones (diff) | |
download | linux-08b37d518af365e7a52fe11320ea683856407581.tar.xz linux-08b37d518af365e7a52fe11320ea683856407581.zip |
cifs: ensure that vol->username is not NULL before running strlen on it
Dan Carpenter says:
The patch 04febabcf55b: "cifs: sanitize username handling" from Jan
17, 2012, leads to the following static checker warning:
fs/cifs/connect.c:2231 match_session()
error: we previously assumed 'vol->username' could be null (see line 2228)
fs/cifs/connect.c
2219 /* NULL username means anonymous session */
2220 if (ses->user_name == NULL) {
2221 if (!vol->nullauth)
2222 return 0;
2223 break;
2224 }
2225
2226 /* anything else takes username/password */
2227 if (strncmp(ses->user_name,
2228 vol->username ? vol->username : "",
^^^^^^^^^^^^^
We added this check for vol->username here.
2229 CIFS_MAX_USERNAME_LEN))
2230 return 0;
2231 if (strlen(vol->username) != 0 &&
^^^^^^^^^^^^^
But this dereference is not checked.
2232 ses->password != NULL &&
2233 strncmp(ses->password,
2234 vol->password ? vol->password : "",
2235 CIFS_MAX_PASSWORD_LEN))
2236 return 0;
...fix this by ensuring that vol->username is not NULL before running
strlen on it.
Signed-off-by: Jeff Layton <jlayton@poochiereds.net>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Steve French <smfrench@gmail.com>
Diffstat (limited to 'virt/kvm')
0 files changed, 0 insertions, 0 deletions