[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <173909511967.39679.271467641210884194.b4-ty@kernel.org>
Date: Sun, 09 Feb 2025 04:58:39 -0500
From: Leon Romanovsky <leon@...nel.org>
To: Selvin Xavier <selvin.xavier@...adcom.com>,
Dan Carpenter <dan.carpenter@...aro.org>
Cc: Kalesh AP <kalesh-anakkur.purayil@...adcom.com>,
Jason Gunthorpe <jgg@...pe.ca>, linux-rdma@...r.kernel.org,
linux-kernel@...r.kernel.org, kernel-janitors@...r.kernel.org
Subject: Re: [PATCH next] RDMA/bnxt_re: Fix buffer overflow in debugfs code
On Fri, 07 Feb 2025 12:16:19 +0300, Dan Carpenter wrote:
> Add some bounds checking to prevent memory corruption in
> bnxt_re_cc_config_set(). This is debugfs code so the bug can only be
> triggered by root.
>
>
Applied, thanks!
[1/1] RDMA/bnxt_re: Fix buffer overflow in debugfs code
https://git.kernel.org/rdma/rdma/c/dbc641ecf1cbd4
Best regards,
--
Leon Romanovsky <leon@...nel.org>
Powered by blists - more mailing lists