diff options
author | Teng Qi <starmiku1207184332@gmail.com> | 2021-11-17 06:44:53 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2021-11-18 14:15:47 +0300 |
commit | a66998e0fbf213d47d02813b9679426129d0d114 (patch) | |
tree | b11e9a25ab4ca26b0f2c907dcdfeb248ee035870 /net | |
parent | a280ef90af01dc133d0a52387e563015686d6294 (diff) | |
download | linux-a66998e0fbf213d47d02813b9679426129d0d114.tar.xz |
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
The if statement:
if (port >= DSAF_GE_NUM)
return;
limits the value of port less than DSAF_GE_NUM (i.e., 8).
However, if the value of port is 6 or 7, an array overflow could occur:
port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off;
because the length of dsaf_dev->mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).
To fix this possible array overflow, we first check port and if it is
greater than or equal to DSAF_MAX_PORT_NUM, the function returns.
Reported-by: TOTE Robot <oslab@tsinghua.edu.cn>
Signed-off-by: Teng Qi <starmiku1207184332@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
0 files changed, 0 insertions, 0 deletions