svn commit: r333304 - head/sys/netinet
Michael Tuexen
tuexen at freebsd.org
Sun May 6 19:55:21 UTC 2018
> On 6. May 2018, at 19:09, Conrad Meyer <cem at FreeBSD.org> wrote:
>
> FYI, Coverity can detect this kind of issue scanning the kernel (not
> just usrsctp). It was detected as CID 1385266 on FreeBSD's Coverity
> Scan.
That is correct. I just had problems in getting access to the FreeBSD
page, so I didn't know the number. This has now been resolved.
Best regards
Michael
>
> Best,
> Conrad
>
> On Sun, May 6, 2018 at 7:19 AM, Michael Tuexen <tuexen at freebsd.org> wrote:
>> Author: tuexen
>> Date: Sun May 6 14:19:50 2018
>> New Revision: 333304
>> URL: https://svnweb.freebsd.org/changeset/base/333304
>>
>> Log:
>> Ensure we are not dereferencing a NULL pointer.
>>
>> This was found by Coverity scanning the usrsctp stack (CID 203808).
>>
>> MFC after: 3 days
>>
>> Modified:
>> head/sys/netinet/sctp_indata.c
>>
>> Modified: head/sys/netinet/sctp_indata.c
>> ==============================================================================
>> --- head/sys/netinet/sctp_indata.c Sun May 6 13:59:56 2018 (r333303)
>> +++ head/sys/netinet/sctp_indata.c Sun May 6 14:19:50 2018 (r333304)
>> @@ -3621,7 +3621,9 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, stru
>> SCTP_SO_NOT_LOCKED);
>> }
>> /* Make sure to flag we had a FR */
>> - tp1->whoTo->net_ack++;
>> + if (tp1->whoTo != NULL) {
>> + tp1->whoTo->net_ack++;
>> + }
>> continue;
>> }
>> }
>>
More information about the svn-src-head
mailing list