mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2026-04-14 09:57:39 +02:00
wilc1000: fix possible memory leak in cfg_scan_result()
[ Upstream commit3c719fed0f] When the BSS reference holds a valid reference, it is not freed. The 'if' condition is wrong. Instead of the 'if (bss)' check, the 'if (!bss)' check is used. The issue is solved by removing the unnecessary 'if' check because cfg80211_put_bss() already performs the NULL validation. Fixes:6cd4fa5ab6("staging: wilc1000: make use of cfg80211_inform_bss_frame()") Signed-off-by: Ajay Singh <ajay.kathat@microchip.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org> Link: https://lore.kernel.org/r/20210916164902.74629-3-ajay.kathat@microchip.com Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
committed by
Greg Kroah-Hartman
parent
2c4415e819
commit
7bcbced253
@@ -129,8 +129,7 @@ static void cfg_scan_result(enum scan_event scan_event,
|
||||
info->frame_len,
|
||||
(s32)info->rssi * 100,
|
||||
GFP_KERNEL);
|
||||
if (!bss)
|
||||
cfg80211_put_bss(wiphy, bss);
|
||||
cfg80211_put_bss(wiphy, bss);
|
||||
} else if (scan_event == SCAN_EVENT_DONE) {
|
||||
mutex_lock(&priv->scan_req_lock);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user