aboutsummaryrefslogtreecommitdiffstats
path: root/fs/smb/client/cifs_unicode.c
diff options
context:
space:
mode:
authorMakar Semyonov <[email protected]>2025-09-04 12:28:41 +0000
committerSteve French <[email protected]>2025-09-04 16:43:31 +0000
commit70bccd9855dae56942f2b18a08ba137bb54093a0 (patch)
treeb3a165f697f4ddcf9bda392999aef504753c51ec /fs/smb/client/cifs_unicode.c
parentsmb: client: show negotiated cipher in DebugData (diff)
downloadkernel-70bccd9855dae56942f2b18a08ba137bb54093a0.tar.gz
kernel-70bccd9855dae56942f2b18a08ba137bb54093a0.zip
cifs: prevent NULL pointer dereference in UTF16 conversion
There can be a NULL pointer dereference bug here. NULL is passed to __cifs_sfu_make_node without checks, which passes it unchecked to cifs_strndup_to_utf16, which in turn passes it to cifs_local_to_utf16_bytes where '*from' is dereferenced, causing a crash. This patch adds a check for NULL 'src' in cifs_strndup_to_utf16 and returns NULL early to prevent dereferencing NULL pointer. Found by Linux Verification Center (linuxtesting.org) with SVACE Signed-off-by: Makar Semyonov <[email protected]> Cc: [email protected] Signed-off-by: Steve French <[email protected]>
Diffstat (limited to 'fs/smb/client/cifs_unicode.c')
-rw-r--r--fs/smb/client/cifs_unicode.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/fs/smb/client/cifs_unicode.c b/fs/smb/client/cifs_unicode.c
index 4cc6e0896fad..f8659d36793f 100644
--- a/fs/smb/client/cifs_unicode.c
+++ b/fs/smb/client/cifs_unicode.c
@@ -629,6 +629,9 @@ cifs_strndup_to_utf16(const char *src, const int maxlen, int *utf16_len,
int len;
__le16 *dst;
+ if (!src)
+ return NULL;
+
len = cifs_local_to_utf16_bytes(src, maxlen, cp);
len += 2; /* NULL */
dst = kmalloc(len, GFP_KERNEL);