lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4A481B88.30806@gmail.com>
Date:	Mon, 29 Jun 2009 09:40:24 +0800
From:	Eric Miao <eric.y.miao@...il.com>
To:	Aviv Laufer <aviv.laufer@...il.com>
CC:	Richard Purdie <rpurdie@...ys.net>, eric.miao@...vell.com,
	linux-kernel@...r.kernel.org
Subject: Re: Bug in tdo24m

Richard Purdie wrote:
> Hi,
> 
> On Tue, 2009-06-23 at 15:16 +0300, Aviv Laufer wrote:
>> I have found a bug in tdo24m.c .
>> There is a call to kmalloc with the second param is sizeeof (flag)
>> instead of flag.
>> This cause  a crash.
> 
> Thats quite a nasty bug and its surprising its not been found before
> now! Can you resubmit the patch with description and most importantly a
> Signed-off-by line please (see Documentation/SubmittingPatches)?
> 

Ooops - this is embarrassing, yet I didn't find this causing any crash
by now,  tdo24m works just OK on my Littleton and thus hiding this bug
deeply.

Aviv,

Any update on this patch? I'd like to queue this ASAP.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ