lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140422083917.GS4963@mwanda>
Date:	Tue, 22 Apr 2014 11:39:17 +0300
From:	Dan Carpenter <dan.carpenter@...cle.com>
To:	Pavel Machek <pavel@....cz>
Cc:	hans.verkuil@...co.com, m.chehab@...sung.com,
	ext-eero.nurkkala@...ia.com, nils.faerber@...nelconcepts.de,
	joni.lapilainen@...il.com, freemangordon@....bg, sre@...g0.de,
	pali.rohar@...il.com, Greg KH <greg@...ah.com>, trivial@...nel.org,
	kernel list <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] radio-bcm2048.c: fix wrong overflow check

On Sun, Apr 20, 2014 at 04:56:22PM +0200, Pavel Machek wrote:
> 
> Fix wrong overflow check in radio-bcm2048.
> 
> Signed-off-by: Pali Rohár <pali.rohar@...il.com>
> Signed-off-by: Pavel Machek <pavel@....cz>

Signed off means like you're signing a legal document to show that you
didn't do anything illegal when you handled the patch.  Was this patch
authored by Pali?  If so, then use the From: header.

Btw, I reported this bug on Dec 10 last year.  It's better that we fix
it now than not fix it at all but we could have done better.  Was the
kbuild-zero-day bug report format confusing or how could I have helped
out there?

regards,
dan carpenter

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ