Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6986317rwb; Tue, 22 Nov 2022 23:59:46 -0800 (PST) X-Google-Smtp-Source: AA0mqf4FHOwjyengQK7JZgyeHIb04JICWzHuMEBViats9n+bKJ7JS/Oqsl8/Cwhx9hI2SVh5cV+k X-Received: by 2002:aa7:c042:0:b0:462:2f5a:8618 with SMTP id k2-20020aa7c042000000b004622f5a8618mr24492765edo.42.1669190386105; Tue, 22 Nov 2022 23:59:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669190386; cv=none; d=google.com; s=arc-20160816; b=hZt9BooXKSivBL6800Rfo/3p6SZSi2JavH3kQt9rZVNgEkQ1Q2Q8d/tCqB2PshNWIb jk1TexYFCTBYwTS5jXrB5r9tJlBpEEolszgowZ668eEipGEm8B3ucOj5b0B7fmz4/igA u6SiW5uv9ZNtFH1i01xEnppaDq3886bUGYPORU/PoyvgDk9A0jsUqcllZjyZXPzcV+ry ypdFWQTGIUhluFFy9pXKXyi5SIGJ1PItCKEsjIJGHt9BYbcbO8cemUHevKNJ2qgvC3oE +7blOTs0ykAzzIlXPgKUzOoITa8z2pTfCcj4k5POaMeUDeUdQPggi76eIn0EbK5VTkOm 06kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:dkim-signature:from; bh=NyGQuAK8qaIoADlkM2cY8C4CbAnRMBfaC7DAeE7V5QM=; b=rCsHb0hV6ORpAWhP6E7cot5qbIN07EDRCfEFxeL/cjOGpJw8Oc/EVXtHGmR0wRd8rv PO0Ss9olS7VQy44yThjevmizZsYQFevDxzddQGfbrg4wFo8SfJk/hlt7/QM22uSKXKa7 OcsQ0Zse/TwTpxKNNVWIM6gHZQjcS5JcxGttVCHJPwfWggiT7z7XDIokFeI9My9TUlFe oN8dC9v1nZS9kinDY858W04Iie8JI2vbY/S6YMgPVLOfuffYQtpwXCxHUcV77fxU4P9g v6jhjvyivVQF7XVcQuiIQdOtttsozZ7f6QGDNtwvBFVEXQobyMJvSyK0ZVecY2dTNSga oJzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@swemel.ru header.s=mail header.b=NstPDabF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=swemel.ru Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sz15-20020a1709078b0f00b007aea9dfb4f5si12375471ejc.511.2022.11.22.23.59.24; Tue, 22 Nov 2022 23:59:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@swemel.ru header.s=mail header.b=NstPDabF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=swemel.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235951AbiKWHqM (ORCPT + 90 others); Wed, 23 Nov 2022 02:46:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50738 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235411AbiKWHpv (ORCPT ); Wed, 23 Nov 2022 02:45:51 -0500 Received: from mx.swemel.ru (mx.swemel.ru [95.143.211.150]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B9C78F8849; Tue, 22 Nov 2022 23:45:49 -0800 (PST) From: Denis Arefev DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=swemel.ru; s=mail; t=1669189547; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=NyGQuAK8qaIoADlkM2cY8C4CbAnRMBfaC7DAeE7V5QM=; b=NstPDabF4kgRZAUFh1fBWd3+20zAEWf32RVcthDIrI5oC3RwwwmDUQW+OkEYahOm5b9YBt R/AuEBRng0GSouJ7Xm44jU5UyW7tWpHs+12e1XLlt+tglhwEecp7JwwhKJtZz1WxoQuB9m UVWko0D7OA9wXv0fyhbZvtgt175wcQU= To: Anil Gurumurthy Cc: Sudarsana Kalluru , "James E.J. Bottomley" , "Martin K. Petersen" , linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, trufanov@swemel.ru, vfh@swemel.ru Subject: [PATCH] scsi: bfa: Eliminated buffer overflow Date: Wed, 23 Nov 2022 10:45:46 +0300 Message-Id: <20221123074546.30340-1-arefev@swemel.ru> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Buffer 'cmd->adapter_hwpath' of size 32 accessed at bfad_bsg.c:101:103 can overflow, since its index 'i' can have value 32 that is out of range. Signed-off-by: Denis Arefev --- drivers/scsi/bfa/bfad_bsg.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/scsi/bfa/bfad_bsg.c b/drivers/scsi/bfa/bfad_bsg.c index be8dfbe13e90..78615ffc62ef 100644 --- a/drivers/scsi/bfa/bfad_bsg.c +++ b/drivers/scsi/bfa/bfad_bsg.c @@ -98,9 +98,9 @@ bfad_iocmd_ioc_get_info(struct bfad_s *bfad, void *cmd) /* set adapter hw path */ strcpy(iocmd->adapter_hwpath, bfad->pci_name); - for (i = 0; iocmd->adapter_hwpath[i] != ':' && i < BFA_STRING_32; i++) + for (i = 0; iocmd->adapter_hwpath[i] != ':' && i < BFA_STRING_32-2; i++) ; - for (; iocmd->adapter_hwpath[++i] != ':' && i < BFA_STRING_32; ) + for (; iocmd->adapter_hwpath[++i] != ':' && i < BFA_STRING_32-1; ) ; iocmd->adapter_hwpath[i] = '\0'; iocmd->status = BFA_STATUS_OK; -- 2.25.1