diff options
author | Jesper Juhl <jesper.juhl@gmail.com> | 2007-08-07 18:10:54 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2007-08-07 18:10:54 -0700 |
commit | 3af8e31cf57646284b5f77f9d57d2c22fa77485a (patch) | |
tree | 4c39d509d0c6db9e2bfdbabc8f4be66d3795d308 /security | |
parent | 864c5a4d37b1f25e3c36dd00a09158eae455a8fd (diff) |
[NETFILTER]: ipt_recent: avoid a possible NULL pointer deref in recent_seq_open()
If the call to seq_open() returns != 0 then the code calls
kfree(st) but then on the very next line proceeds to
dereference the pointer - not good.
Problem spotted by the Coverity checker.
Signed-off-by: Jesper Juhl <jesper.juhl@gmail.com>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions