lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 18 Sep 2017 08:41:02 +0200 From: Greg KH <greg@...ah.com> To: "Levin, Alexander (Sasha Levin)" <alexander.levin@...izon.com> Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "stable@...r.kernel.org" <stable@...r.kernel.org>, Myungho Jung <mhjungk@...il.com>, "David S . Miller" <davem@...emloft.net> Subject: Re: [PATCH for 4.9 01/39] net: core: Prevent from dereferencing null pointer when releasing SKB On Mon, Sep 18, 2017 at 12:19:36AM +0000, Levin, Alexander (Sasha Levin) wrote: > From: Myungho Jung <mhjungk@...il.com> > > [ Upstream commit 9899886d5e8ec5b343b1efe44f185a0e68dc6454 ] > > Added NULL check to make __dev_kfree_skb_irq consistent with kfree > family of functions. > > Link: https://bugzilla.kernel.org/show_bug.cgi?id=195289 > > Signed-off-by: Myungho Jung <mhjungk@...il.com> > Signed-off-by: David S. Miller <davem@...emloft.net> > Signed-off-by: Sasha Levin <alexander.levin@...izon.com> Is this a different series from your original XX/59 patch series that you feel is ready to go into the stable tree, or are you still asking for review for these before they get submitted? thanks, greg k-h
Powered by blists - more mailing lists